Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
Analysis ID:755939
MD5:f536ea8fb5b6586bb2ffc764cd52abff
SHA1:313804060f2511b8382d369a3949d5524c1adaef
SHA256:e539f80082f961c600e6ff2a21e969d0641aa787831259d3fdd772b28d469721
Tags:exe
Infos:

Detection

DBatLoader, FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected DBatLoader
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Maps a DLL or memory area into another process
Writes to foreign memory regions
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
WScript reads language and country specific registry keys (likely country aware script)
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Checks if the current process is being debugged
Found large amount of non-executed APIs
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe (PID: 6024 cmdline: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe MD5: F536EA8FB5B6586BB2FFC764CD52ABFF)
    • wscript.exe (PID: 5988 cmdline: C:\Windows\System32\wscript.exe MD5: 7075DD7B9BE8807FCA93ACD86F724884)
      • explorer.exe (PID: 3452 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • Iuigzwjd.exe (PID: 3208 cmdline: "C:\Users\Public\Libraries\Iuigzwjd.exe" MD5: F536EA8FB5B6586BB2FFC764CD52ABFF)
          • wscript.exe (PID: 1264 cmdline: C:\Windows\System32\wscript.exe MD5: 7075DD7B9BE8807FCA93ACD86F724884)
        • Iuigzwjd.exe (PID: 1848 cmdline: "C:\Users\Public\Libraries\Iuigzwjd.exe" MD5: F536EA8FB5B6586BB2FFC764CD52ABFF)
          • wscript.exe (PID: 5044 cmdline: C:\Windows\System32\wscript.exe MD5: 7075DD7B9BE8807FCA93ACD86F724884)
  • cleanup
{"C2 list": ["www.brainbookgroup.com/nvp4/"]}
{"Download Url": "https://onedrive.live.com/download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%21850&authkey=AEcOcvbyHqeCMT0"}
SourceRuleDescriptionAuthorStrings
C:\Users\Public\Libraries\djwzgiuI.urlMethodology_Shortcut_HotKeyDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
  • 0x58:$hotkey: \x0AHotKey=7
  • 0x0:$url_explicit: [InternetShortcut]
C:\Users\Public\Libraries\djwzgiuI.urlMethodology_Contains_Shortcut_OtherURIhandlersDetects possible shortcut usage for .URL persistence@itsreallynick (Nick Carr)
  • 0x14:$file: URL=
  • 0x0:$url_explicit: [InternetShortcut]
SourceRuleDescriptionAuthorStrings
00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x7d58:$a1: 3C 30 50 4F 53 54 74 09 40
    • 0x20787:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0xc026:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    • 0x1954e:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
    00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x1934c:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x18df8:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x1944e:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x195c6:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xbbf1:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x18043:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x1f4fe:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x204f1:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x1b820:$sqlite3step: 68 34 1C 7B E1
    • 0x1c398:$sqlite3step: 68 34 1C 7B E1
    • 0x1b862:$sqlite3text: 68 38 2A 90 C5
    • 0x1c3dd:$sqlite3text: 68 38 2A 90 C5
    • 0x1b879:$sqlite3blob: 68 53 D8 7F 8C
    • 0x1c3f3:$sqlite3blob: 68 53 D8 7F 8C
    00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      Click to see the 6 entries
      SourceRuleDescriptionAuthorStrings
      0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2720000.2.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
        0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2a2eed8.3.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
          1.2.wscript.exe.10410000.3.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            1.2.wscript.exe.10410000.3.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x7d58:$a1: 3C 30 50 4F 53 54 74 09 40
            • 0x20787:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0xc026:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
            • 0x1954e:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
            1.2.wscript.exe.10410000.3.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
            • 0x1934c:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
            • 0x18df8:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
            • 0x1944e:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
            • 0x195c6:$sequence_4: 5D C3 8D 50 7C 80 FA 07
            • 0xbbf1:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
            • 0x18043:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
            • 0x1f4fe:$sequence_8: 3C 54 74 04 3C 74 75 F4
            • 0x204f1:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
            Click to see the 6 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeReversingLabs: Detection: 15%
            Source: SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeVirustotal: Detection: 30%Perma Link
            Source: Yara matchFile source: 1.2.wscript.exe.10410000.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.wscript.exe.10410000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeAvira: detected
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeAvira: detection malicious, Label: HEUR/AGEN.1214697
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeReversingLabs: Detection: 15%
            Source: SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeJoe Sandbox ML: detected
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeJoe Sandbox ML: detected
            Source: 0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2581218.0.unpackAvira: Label: TR/Patched.Ren.Gen
            Source: 0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2720000.2.unpackAvira: Label: TR/Hijacker.Gen
            Source: 0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2a2eed8.3.unpackAvira: Label: TR/Patched.Ren.Gen
            Source: SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeMalware Configuration Extractor: DBatLoader {"Download Url": "https://onedrive.live.com/download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%21850&authkey=AEcOcvbyHqeCMT0"}
            Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.brainbookgroup.com/nvp4/"]}
            Source: SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: unknownHTTPS traffic detected: 13.107.43.13:443 -> 192.168.2.3:49694 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 13.107.43.12:443 -> 192.168.2.3:49695 version: TLS 1.2
            Source: Binary string: explorer.pdbUGP source: wscript.exe, 00000001.00000002.572034695.0000000005D50000.00000040.00000001.00040000.00000000.sdmp
            Source: Binary string: wscript.pdbGCTL source: explorer.exe, 00000002.00000002.591545525.0000000015563000.00000004.00000001.00040000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: wscript.exe, 00000001.00000003.277522589.0000000004D22000.00000004.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.279077303.0000000004EBD000.00000004.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.566831763.0000000005920000.00000040.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.569256565.0000000005A3F000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: wscript.exe, wscript.exe, 00000001.00000003.277522589.0000000004D22000.00000004.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.279077303.0000000004EBD000.00000004.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.566831763.0000000005920000.00000040.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.569256565.0000000005A3F000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wscript.pdb source: explorer.exe, 00000002.00000002.591545525.0000000015563000.00000004.00000001.00040000.00000000.sdmp
            Source: Binary string: explorer.pdb source: wscript.exe, 00000001.00000002.572034695.0000000005D50000.00000040.00000001.00040000.00000000.sdmp
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02725B48 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,

            Networking

            barindex
            Source: Malware configuration extractorURLs: www.brainbookgroup.com/nvp4/
            Source: Malware configuration extractorURLs: https://onedrive.live.com/download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%21850&authkey=AEcOcvbyHqeCMT0
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: Joe Sandbox ViewIP Address: 13.107.43.12 13.107.43.12
            Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
            Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
            Source: explorer.exe, 00000002.00000000.328190890.000000000F270000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: unknownDNS traffic detected: queries for: onedrive.live.com
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02738CBC InternetOpenA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,
            Source: global trafficHTTP traffic detected: GET /download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%21850&authkey=AEcOcvbyHqeCMT0 HTTP/1.1User-Agent: 70Host: onedrive.live.com
            Source: global trafficHTTP traffic detected: GET /y4mJr27PXKP1w7VmweyBhr9jXuXcCKUmjp-l0AjYgYvmFILscr-gs1ZCYQgPakl85NdXiyluyI2K__n-DTHXtIuKBfix9QJgWA8xZXLmTFKCzO-QrrlJfjFNlxYKvj4CV1InzMNLAsu2pDihkqbVzbigQu3lZ2fbCWy9RogAq5NxzuJ1VRoowitd9q4QmyU6H1eR5JdbJA1JsNbjwDPqFHy3g/Iuigzwjduoa?download&psid=1 HTTP/1.1User-Agent: 70Host: oyuurg.ph.files.1drv.comConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 13.107.43.13:443 -> 192.168.2.3:49694 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 13.107.43.12:443 -> 192.168.2.3:49695 version: TLS 1.2

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 1.2.wscript.exe.10410000.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.wscript.exe.10410000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 1.2.wscript.exe.10410000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 1.2.wscript.exe.10410000.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 1.2.wscript.exe.10410000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.wscript.exe.10410000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 1.2.wscript.exe.10410000.3.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 1.2.wscript.exe.10410000.3.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: Process Memory Space: wscript.exe PID: 5988, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: 1.2.wscript.exe.10410000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 1.2.wscript.exe.10410000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 1.2.wscript.exe.10410000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.wscript.exe.10410000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 1.2.wscript.exe.10410000.3.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 1.2.wscript.exe.10410000.3.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: Process Memory Space: wscript.exe PID: 5988, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: C:\Users\Public\Libraries\djwzgiuI.url, type: DROPPEDMatched rule: Methodology_Shortcut_HotKey author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, score = 27.09.2019, reference = https://twitter.com/cglyer/status/1176184798248919044
            Source: C:\Users\Public\Libraries\djwzgiuI.url, type: DROPPEDMatched rule: Methodology_Contains_Shortcut_OtherURIhandlers author = @itsreallynick (Nick Carr), description = Detects possible shortcut usage for .URL persistence, score = 27.09.2019, reference = https://twitter.com/cglyer/status/1176184798248919044
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_027220F4
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05972581
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595D5E0
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A125DD
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A12D07
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05940D20
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A11D55
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595841F
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0D466
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A11FF1
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A1DFCE
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A12EF7
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05966E30
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0D616
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594F900
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05964120
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595B090
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A120A8
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059720A0
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A128EC
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A1E824
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01002
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597EBB0
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0DBD2
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A003DA
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A12B28
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A122AE
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059FFA2B
            Source: C:\Windows\SysWOW64\wscript.exeCode function: String function: 0594B150 appears 45 times
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: String function: 02724C24 appears 221 times
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: String function: 027248A0 appears 53 times
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: String function: 02724A98 appears 51 times
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02739128 InetIsOffline,InetIsOffline,CopyFileA,WinExec,Sleep,OpenProcess,NtSuspendThread,InetIsOffline,ZwClose,InetIsOffline,InetIsOffline,ExitProcess,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02733690 LoadLibraryA,GetModuleHandleA,GetProcAddress,RtlMoveMemory,GetCurrentProcess,NtFlushVirtualMemory,FreeLibrary,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0273779C InetIsOffline,VirtualAlloc,GetProcAddress,FreeLibrary,VirtualFree,VirtualAllocEx,GetProcAddress,FreeLibrary,WriteProcessMemory,NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0273368E LoadLibraryA,GetModuleHandleA,GetProcAddress,RtlMoveMemory,GetCurrentProcess,NtFlushVirtualMemory,FreeLibrary,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02733990 InetIsOffline,CreateProcessA,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,VirtualAllocEx,VirtualAllocEx,GetProcAddress,FreeLibrary,NtProtectVirtualMemory,SetThreadContext,NtResumeThread,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0273398E InetIsOffline,CreateProcessA,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,GetProcAddress,FreeLibrary,NtProtectVirtualMemory,SetThreadContext,NtResumeThread,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059895D0 NtClose,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989FE0 NtCreateMutant,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059896E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059899A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059895F0 NtQueryInformationFile,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0598AD30 NtSetContextThread,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989520 NtWaitForSingleObject,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989540 NtReadFile,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989560 NtWriteFile,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059897A0 NtUnmapViewOfSection,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0598A710 NtOpenProcessToken,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989710 NtQueryInformationToken,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989730 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0598A770 NtOpenThread,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989770 NtSetInformationFile,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989760 NtOpenProcess,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059896D0 NtCreateKey,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989610 NtEnumerateValueKey,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989650 NtQueryValueKey,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989670 NtQueryInformationProcess,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059899D0 NtCreateProcessEx,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989950 NtQueueApcThread,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059898A0 NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059898F0 NtReadVirtualMemory,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989820 NtEnumerateKey,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0598B040 NtSuspendThread,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989840 NtDelayExecution,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0598A3B0 NtGetContextThread,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989B00 NtSetValueKey,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989A80 NtOpenDirectoryObject,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989A10 NtQuerySection,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989A00 NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989A20 NtResumeThread,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05989A50 NtCreateFile,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeSection loaded: amtahoo.dll
            Source: SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeReversingLabs: Detection: 15%
            Source: SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeVirustotal: Detection: 30%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\wscript.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Iuigzwjd.exe "C:\Users\Public\Libraries\Iuigzwjd.exe"
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\wscript.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Iuigzwjd.exe "C:\Users\Public\Libraries\Iuigzwjd.exe"
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\wscript.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\wscript.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Users\Public\Libraries\Iuigzwjd.exe "C:\Users\Public\Libraries\Iuigzwjd.exe"
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\wscript.exe
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\wscript.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4Jump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@10/5@2/2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0272823A GetDiskFreeSpaceA,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02735770 CreateToolhelp32Snapshot,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: SysTabControl32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: Binary string: explorer.pdbUGP source: wscript.exe, 00000001.00000002.572034695.0000000005D50000.00000040.00000001.00040000.00000000.sdmp
            Source: Binary string: wscript.pdbGCTL source: explorer.exe, 00000002.00000002.591545525.0000000015563000.00000004.00000001.00040000.00000000.sdmp
            Source: Binary string: wntdll.pdbUGP source: wscript.exe, 00000001.00000003.277522589.0000000004D22000.00000004.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.279077303.0000000004EBD000.00000004.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.566831763.0000000005920000.00000040.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.569256565.0000000005A3F000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: wscript.exe, wscript.exe, 00000001.00000003.277522589.0000000004D22000.00000004.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000003.279077303.0000000004EBD000.00000004.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.566831763.0000000005920000.00000040.00000800.00020000.00000000.sdmp, wscript.exe, 00000001.00000002.569256565.0000000005A3F000.00000040.00000800.00020000.00000000.sdmp
            Source: Binary string: wscript.pdb source: explorer.exe, 00000002.00000002.591545525.0000000015563000.00000004.00000001.00040000.00000000.sdmp
            Source: Binary string: explorer.pdb source: wscript.exe, 00000001.00000002.572034695.0000000005D50000.00000040.00000001.00040000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2720000.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2a2eed8.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2a2eed8.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.278011909.0000000002520000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.278530431.0000000002A2E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0273F2A4 push 0273F310h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0273F0AC push 0273F125h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0273F144 push 0273F1ECh; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0273F1F8 push 0273F288h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0272C718 push ecx; mov dword ptr [esp], edx
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0272D78C push 0272D7B8h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_027384FC push 02738554h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_027344AC push 027344EEh; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02735488 push 027354F2h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_027265FA push 02726657h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_027265FC push 02726657h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_027335A6 push 02733653h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_027335A8 push 02733653h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02726A48 push 02726A8Ah; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02723894 push eax; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0272CE1C push 0272CFA2h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0272FEA0 push 0272FF16h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0272FFA3 push 0272FFF1h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0272FFA4 push 0272FFF1h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0273EC64 push 0273EE54h; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02738C58 push ecx; mov dword ptr [esp], edx
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0272CD93 push 0272CFA2h; ret
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0599D0D1 push ecx; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02736388 InetIsOffline,VirtualAlloc,GetProcAddress,FreeLibrary,VirtualAlloc,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualAlloc,VirtualProtect,FreeLibrary,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeFile created: C:\Users\Public\Libraries\Iuigzwjd.exeJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run IuigzwjdJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run IuigzwjdJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_027354F4 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
            Source: C:\Users\Public\Libraries\Iuigzwjd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_CURRENT_USER\Control Panel\International\Geo Nation
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05986DE6 rdtsc
            Source: C:\Windows\SysWOW64\wscript.exeAPI coverage: 3.2 %
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02725B48 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeAPI call chain: ExitProcess graph end node
            Source: explorer.exe, 00000002.00000002.584469703.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}z,
            Source: explorer.exe, 00000002.00000002.585090561.000000000920F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000002.00000002.584469703.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
            Source: explorer.exe, 00000002.00000000.301736425.0000000007166000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}>
            Source: explorer.exe, 00000002.00000000.310518017.0000000008FD3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&0000001 ZG
            Source: explorer.exe, 00000002.00000002.584469703.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}i,
            Source: explorer.exe, 00000002.00000002.584469703.00000000090D8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: AGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}efb8b}00
            Source: explorer.exe, 00000002.00000002.572313088.00000000050A1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}9'
            Source: explorer.exe, 00000002.00000000.310518017.0000000008FD3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
            Source: Iuigzwjd.exe, 0000000E.00000002.563565691.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02736388 InetIsOffline,VirtualAlloc,GetProcAddress,FreeLibrary,VirtualAlloc,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualAlloc,VirtualProtect,FreeLibrary,
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05986DE6 rdtsc
            Source: C:\Windows\SysWOW64\wscript.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A105AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A105AC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05972581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05972581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05972581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05972581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05942D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05942D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05942D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05942D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05942D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05971DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05971DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05971DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059735A1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0FDE2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6DC9 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6DC9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059F8DF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A18D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0E539 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05953D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594AD30 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059CA537 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05974D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05974D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05974D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05967D50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05983D43 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C3540 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059F3D40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595849B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A014FB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A18CD6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A1740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A1740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A1740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597BC2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DC450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DC450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597A44B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596746D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05958794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C7794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C7794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C7794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059837F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596F716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DFF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DFF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597E730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A1070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A1070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05944F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05944F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A18F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595EF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595FF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A10EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A10EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A10EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DFE87 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C46A7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059736CC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059FFEC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05988EC7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A18ED6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059716E0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059576E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05978E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059FFE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A01608 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594E620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05957E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05957E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05957E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05957E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05957E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05957E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0AE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0AE44 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595766D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A049A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A049A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A049A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A049A4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05972990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597A185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596C182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059761A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059761A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C69A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059D41E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05949100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05949100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05949100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05964120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05964120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05964120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05964120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05964120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594C962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05949080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C3884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C3884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597F0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059890AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059720A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059720A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059720A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059720A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059720A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059720A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DB8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059DB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059440E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059440E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059440E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059458EC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C7016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C7016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C7016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A14015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A14015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05960050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05960050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A02073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A11074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05972397 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A15BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597B390 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05951B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05951B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059FD380 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0138A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05974BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05974BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05974BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C53CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059C53CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0596DBE9 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0131B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594F358 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594DB40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05973B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05973B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594DB60 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A18B58 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0595AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0597FAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059452A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059452A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059452A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059452A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059452A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05972ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05972AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0594AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05945210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05945210 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05945210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05945210 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05963A1C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05958A0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05984A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05984A2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A18A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059D4257 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05949240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05949240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05949240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05949240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_0598927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_05A0EA55 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059FB260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059FB260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\wscript.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\wscript.exeCode function: 1_2_059895D0 NtClose,LdrInitializeThunk,

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeMemory written: C:\Windows\SysWOW64\wscript.exe base: 10410000
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeMemory written: C:\Windows\SysWOW64\wscript.exe base: 4740000
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeMemory written: C:\Windows\SysWOW64\wscript.exe base: 47E0000
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeMemory allocated: C:\Windows\SysWOW64\wscript.exe base: 10410000 protect: page execute and read and write
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeMemory allocated: C:\Windows\SysWOW64\wscript.exe base: 4740000 protect: page execute and read and write
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeMemory allocated: C:\Windows\SysWOW64\wscript.exe base: 47E0000 protect: page execute and read and write
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeMemory written: C:\Windows\SysWOW64\wscript.exe base: 10410000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeThread created: C:\Windows\SysWOW64\wscript.exe EIP: 47E0000
            Source: explorer.exe, 00000002.00000000.283075686.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.566817339.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program ManagerT7<=ge
            Source: wscript.exe, 00000001.00000002.572034695.0000000005D50000.00000040.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000000.311425459.00000000090D8000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000002.00000000.295382683.0000000006770000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000002.00000000.283075686.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.566817339.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: wscript.exe, 00000001.00000002.572034695.0000000005D50000.00000040.00000001.00040000.00000000.sdmpBinary or memory string: Microsoft-Reserved-24C26ACC-DE62-4303-88AD-6CD4F1447F18SecurityConfigureWindowsPasswordsProxy DesktopProgmanSoftware\Microsoft\Windows NT\CurrentVersion\WinlogonShellSoftware\Microsoft\Windows NT\CurrentVersion\Winlogon\AlternateShells\AvailableShells
            Source: explorer.exe, 00000002.00000000.281785582.0000000001378000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000002.00000002.563450551.0000000001378000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CProgmanile
            Source: explorer.exe, 00000002.00000000.283075686.0000000001980000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000002.00000002.566817339.0000000001980000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: GetLocaleInfoA,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: GetLocaleInfoA,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_02729438 GetLocalTime,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exeCode function: 0_2_0272B938 GetVersionExA,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1.2.wscript.exe.10410000.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.wscript.exe.10410000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 1.2.wscript.exe.10410000.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.wscript.exe.10410000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Native API
            1
            Registry Run Keys / Startup Folder
            52
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium11
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            1
            Virtualization/Sandbox Evasion
            LSASS Memory121
            Security Software Discovery
            Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)1
            DLL Side-Loading
            52
            Process Injection
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Deobfuscate/Decode Files or Information
            NTDS3
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer13
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Software Packing
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            DLL Side-Loading
            DCSync114
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 755939 Sample: SecuriteInfo.com.Win32.Troj... Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus / Scanner detection for submitted sample 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 4 other signatures 2->44 9 SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe 1 18 2->9         started        process3 dnsIp4 32 l-0003.l-dc-msedge.net 13.107.43.12, 443, 49695 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 9->32 34 l-0004.l-dc-msedge.net 13.107.43.13, 443, 49694 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 9->34 36 3 other IPs or domains 9->36 28 C:\Users\Public\Libraries\Iuigzwjd.exe, PE32 9->28 dropped 30 C:\Users\...\Iuigzwjd.exe:Zone.Identifier, ASCII 9->30 dropped 52 Writes to foreign memory regions 9->52 54 Allocates memory in foreign processes 9->54 56 Creates a thread in another existing process (thread injection) 9->56 58 Injects a PE file into a foreign processes 9->58 14 wscript.exe 9->14         started        file5 signatures6 process7 signatures8 60 Maps a DLL or memory area into another process 14->60 62 WScript reads language and country specific registry keys (likely country aware script) 14->62 17 explorer.exe 14->17 injected process9 process10 19 Iuigzwjd.exe 17->19         started        22 Iuigzwjd.exe 17->22         started        signatures11 46 Antivirus detection for dropped file 19->46 48 Multi AV Scanner detection for dropped file 19->48 50 Machine Learning detection for dropped file 19->50 24 wscript.exe 19->24         started        26 wscript.exe 22->26         started        process12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe15%ReversingLabsWin32.Trojan.Generic
            SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe31%VirustotalBrowse
            SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe100%AviraHEUR/AGEN.1214697
            SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\Public\Libraries\Iuigzwjd.exe100%AviraHEUR/AGEN.1214697
            C:\Users\Public\Libraries\Iuigzwjd.exe100%Joe Sandbox ML
            C:\Users\Public\Libraries\Iuigzwjd.exe15%ReversingLabsWin32.Trojan.Generic
            SourceDetectionScannerLabelLinkDownload
            0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.25c8248.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.0.wscript.exe.10410000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2581218.0.unpack100%AviraTR/Patched.Ren.GenDownload File
            0.0.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.400000.0.unpack100%AviraHEUR/AGEN.1214697Download File
            1.0.wscript.exe.10410000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.2.wscript.exe.5d50000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.2.wscript.exe.10410000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.0.wscript.exe.10410000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.0.wscript.exe.10410000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2720000.2.unpack100%AviraTR/Hijacker.GenDownload File
            0.2.SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe.2a2eed8.3.unpack100%AviraTR/Patched.Ren.GenDownload File
            14.2.Iuigzwjd.exe.2438248.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            www.brainbookgroup.com/nvp4/0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            l-0003.l-dc-msedge.net
            13.107.43.12
            truefalse
              unknown
              l-0004.l-dc-msedge.net
              13.107.43.13
              truefalse
                unknown
                onedrive.live.com
                unknown
                unknownfalse
                  high
                  oyuurg.ph.files.1drv.com
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://onedrive.live.com/download?cid=E0CF7F9E6AAF27EF&resid=E0CF7F9E6AAF27EF%21850&authkey=AEcOcvbyHqeCMT0false
                      high
                      www.brainbookgroup.com/nvp4/true
                      • Avira URL Cloud: safe
                      low
                      https://oyuurg.ph.files.1drv.com/y4mJr27PXKP1w7VmweyBhr9jXuXcCKUmjp-l0AjYgYvmFILscr-gs1ZCYQgPakl85NdXiyluyI2K__n-DTHXtIuKBfix9QJgWA8xZXLmTFKCzO-QrrlJfjFNlxYKvj4CV1InzMNLAsu2pDihkqbVzbigQu3lZ2fbCWy9RogAq5NxzuJ1VRoowitd9q4QmyU6H1eR5JdbJA1JsNbjwDPqFHy3g/Iuigzwjduoa?download&psid=1false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000002.00000000.328190890.000000000F270000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          13.107.43.12
                          l-0003.l-dc-msedge.netUnited States
                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                          13.107.43.13
                          l-0004.l-dc-msedge.netUnited States
                          8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                          Joe Sandbox Version:36.0.0 Rainbow Opal
                          Analysis ID:755939
                          Start date and time:2022-11-29 10:40:46 +01:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 11m 42s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:18
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:1
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winEXE@10/5@2/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 99.8% (good quality ratio 86.8%)
                          • Quality average: 74.2%
                          • Quality standard deviation: 34.1%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                          • TCP Packets have been reduced to 100
                          • Excluded domains from analysis (whitelisted): www.bing.com, odc-web-brs.onedrive.akadns.net, odwebpl.trafficmanager.net.l-0004.dc-msedge.net.l-0004.l-msedge.net, fs.microsoft.com, ocsp.digicert.com, odc-web-geo.onedrive.akadns.net, ph-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, ctldl.windowsupdate.com, odc-ph-files-geo.onedrive.akadns.net, odc-ph-files-brs.onedrive.akadns.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenFile calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          10:41:50API Interceptor1x Sleep call for process: SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe modified
                          10:41:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Iuigzwjd C:\Users\Public\Libraries\djwzgiuI.url
                          10:42:04AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Iuigzwjd C:\Users\Public\Libraries\djwzgiuI.url
                          10:42:10API Interceptor2x Sleep call for process: Iuigzwjd.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):189869
                          Entropy (8bit):7.993154525475343
                          Encrypted:true
                          SSDEEP:3072:JB2ruI114IXlkeukze3mxOVeFRTe8a+opBUMkNtSx1WOUzM80SAjWsNhX5deg/+V:JB2rRxuZmxOVuTe8lozUMWtS2grfx+V
                          MD5:7AC99DA57C0EE5DEC172741B47903FA4
                          SHA1:90BD8551DD694D2AB0A857731735761F25D6FD29
                          SHA-256:867D6D0F50C2C377B44B4988A55C484C29CAFE4306032F72809C749178E05F7A
                          SHA-512:0AD7A7B6FF56F9F2AAF3DCAAD013D22D5A4D592DFD2B01D5419CDECA49BE8F4C7433ABB5948C22E92181A37CF74E372A1287E2092C09AD93EEB832B2CA8AA8BF
                          Malicious:false
                          Reputation:low
                          Preview:....4.e.4..kk.4........kk.4.......4..o..}..}..yq..uo..o..o.swos...m.q..us...q.s.....w.......4.e.4..kk.4........kk.4.......4..us.....{m....4.e.4..kk.4........kk.4.......47)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'.....Y.^..._....j...0..-.2sW..(TD..M>."....6)y.s.Tl...#....K3-.h.....(.H.....(....'zI...hS(.#&n......C".`..O..TG
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):750592
                          Entropy (8bit):6.871648147377771
                          Encrypted:false
                          SSDEEP:12288:i1qMhtVLzLypCggIh36+O9dvjpQVeri442qKk/RqIkr:WFhHzmQgn6+8T/r7PaqI
                          MD5:F536EA8FB5B6586BB2FFC764CD52ABFF
                          SHA1:313804060F2511B8382D369A3949D5524C1ADAEF
                          SHA-256:E539F80082F961C600E6FF2A21E969D0641AA787831259D3FDD772B28D469721
                          SHA-512:873E0A7174BE40DB35F8E8F06FD7FFAF340128E7EE6EC09F691CA8857AAC9B1F4C5D6CDB76841858EF4E52B2FA5A4A9A18588221567626FE1474B8B101CEF8EA
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 15%
                          Reputation:low
                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................b.......&.......0....@..............................................@........................... ...%.......$...................p...n...........................`......................$'...............................text...,........................... ..`.itext..$.... ...................... ..`.data........0......................@....bss....`6...............................idata...%... ...&..................@....tls....4....P...........................rdata.......`......................@..@.reloc...n...p...p..................@..B.rsrc....$.......$...N..............@..@.....................r..............@..@................................................................................................
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Preview:[ZoneTransfer]....ZoneId=0
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
                          File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Iuigzwjd.exe">), ASCII text, with CRLF line terminators
                          Category:modified
                          Size (bytes):100
                          Entropy (8bit):5.05252935030364
                          Encrypted:false
                          SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMVKSsGKd6dbP6v:HRYFVmTWDyz/SsbMPE
                          MD5:94A7CAD400BB0ED39AE61258D1388317
                          SHA1:E3F698F5EAA841B12F2077F1884F1719CF6BADF0
                          SHA-256:89A9D4CDBC1953F6092CF9A15E8AEB63E599B5600345E2297E075C95CE2DC0AC
                          SHA-512:ECF712A5F03DE0D19D8B83E11A579B5C5056548F08C15BD79F8DCBA6E671AF0C0B3C0AF60D97038D98D316774277DFD28223CF2EF188EC1F58BEC53EBB093DE3
                          Malicious:false
                          Yara Hits:
                          • Rule: Methodology_Shortcut_HotKey, Description: Detects possible shortcut usage for .URL persistence, Source: C:\Users\Public\Libraries\djwzgiuI.url, Author: @itsreallynick (Nick Carr)
                          • Rule: Methodology_Contains_Shortcut_OtherURIhandlers, Description: Detects possible shortcut usage for .URL persistence, Source: C:\Users\Public\Libraries\djwzgiuI.url, Author: @itsreallynick (Nick Carr)
                          Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Iuigzwjd.exe"..IconIndex=28..HotKey=79..
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):189869
                          Entropy (8bit):7.993154525475343
                          Encrypted:true
                          SSDEEP:3072:JB2ruI114IXlkeukze3mxOVeFRTe8a+opBUMkNtSx1WOUzM80SAjWsNhX5deg/+V:JB2rRxuZmxOVuTe8lozUMWtS2grfx+V
                          MD5:7AC99DA57C0EE5DEC172741B47903FA4
                          SHA1:90BD8551DD694D2AB0A857731735761F25D6FD29
                          SHA-256:867D6D0F50C2C377B44B4988A55C484C29CAFE4306032F72809C749178E05F7A
                          SHA-512:0AD7A7B6FF56F9F2AAF3DCAAD013D22D5A4D592DFD2B01D5419CDECA49BE8F4C7433ABB5948C22E92181A37CF74E372A1287E2092C09AD93EEB832B2CA8AA8BF
                          Malicious:false
                          Preview:....4.e.4..kk.4........kk.4.......4..o..}..}..yq..uo..o..o.swos...m.q..us...q.s.....w.......4.e.4..kk.4........kk.4.......4..us.....{m....4.e.4..kk.4........kk.4.......47)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'........-..7.9...77'...'.)1./.97)..9.....%...7...9.'.....Y.^..._....j...0..-.2sW..(TD..M>."....6)y.s.Tl...#....K3-.h.....(.H.....(....'zI...hS(.#&n......C".`..O..TG
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.871648147377771
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.38%
                          • InstallShield setup (43055/19) 0.43%
                          • Windows Screen Saver (13104/52) 0.13%
                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          File name:SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
                          File size:750592
                          MD5:f536ea8fb5b6586bb2ffc764cd52abff
                          SHA1:313804060f2511b8382d369a3949d5524c1adaef
                          SHA256:e539f80082f961c600e6ff2a21e969d0641aa787831259d3fdd772b28d469721
                          SHA512:873e0a7174be40db35f8e8f06fd7ffaf340128e7ee6ec09f691ca8857aac9b1f4c5d6cdb76841858ef4e52b2fa5a4a9a18588221567626fe1474b8b101cef8ea
                          SSDEEP:12288:i1qMhtVLzLypCggIh36+O9dvjpQVeri442qKk/RqIkr:WFhHzmQgn6+8T/r7PaqI
                          TLSH:FFF47E6761D04537D02716398C1BA7A8596F7EE03F14BC6667E03DCC9F382CA74292AB
                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                          Icon Hash:2321270727090923
                          Entrypoint:0x4626e8
                          Entrypoint Section:.itext
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                          DLL Characteristics:
                          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:5a047051636dce23e36a7dceaf1507c0
                          Instruction
                          push ebp
                          mov ebp, esp
                          add esp, FFFFFFF0h
                          mov eax, 0046105Ch
                          call 00007F450101B915h
                          mov ecx, dword ptr [0046D410h]
                          mov eax, dword ptr [0046D324h]
                          mov eax, dword ptr [eax]
                          mov edx, dword ptr [00460A90h]
                          call 00007F450106E2EDh
                          mov eax, dword ptr [0046D324h]
                          mov eax, dword ptr [eax]
                          call 00007F450106E361h
                          call 00007F4501019A18h
                          lea eax, dword ptr [eax+00h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x720000x25ac.idata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x7e0000x42400.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x770000x6eec.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x760000x18.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x727240x5e4.idata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x6022c0x60400False0.5191025771103897data6.531038724700122IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .itext0x620000x7240x800False0.57373046875data5.847823102407548IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .data0x630000xa49c0xa600False0.08546686746987951data6.483179375342552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .bss0x6e0000x36600x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .idata0x720000x25ac0x2600False0.32452713815789475data5.139331879404015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .tls0x750000x340x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rdata0x760000x180x200False0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x770000x6eec0x7000False0.6196986607142857data6.6810323966616IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          .rsrc0x7e0000x424000x42400False0.4435620577830189data6.403601787519998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_CURSOR0x7ef0c0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States
                          RT_CURSOR0x7f0400x134dataEnglishUnited States
                          RT_CURSOR0x7f1740x134dataEnglishUnited States
                          RT_CURSOR0x7f2a80x134dataEnglishUnited States
                          RT_CURSOR0x7f3dc0x134dataEnglishUnited States
                          RT_CURSOR0x7f5100x134dataEnglishUnited States
                          RT_CURSOR0x7f6440x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States
                          RT_BITMAP0x7f7780x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x7f8a00x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x7f9c80x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x7faf00xe8Device independent bitmap graphic, 13 x 16 x 4, image size 128EnglishUnited States
                          RT_BITMAP0x7fbd80x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x7fd000x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x7fe280xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States
                          RT_BITMAP0x7fef80x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x800200x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x801480x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x802700x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x803980x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x804c00xe8Device independent bitmap graphic, 12 x 16 x 4, image size 128EnglishUnited States
                          RT_BITMAP0x805a80x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x806d00x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x807f80xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States
                          RT_BITMAP0x808c80x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x809f00x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x80b180x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x80c400x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x80d680x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x80e900xe8Device independent bitmap graphic, 13 x 16 x 4, image size 128EnglishUnited States
                          RT_BITMAP0x80f780x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x810a00x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x811c80xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States
                          RT_BITMAP0x812980x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States
                          RT_BITMAP0x813c00x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States
                          RT_ICON0x814e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096
                          RT_ICON0x825900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216
                          RT_ICON0x84b380x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736
                          RT_ICON0x89fc00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864
                          RT_STRING0x934680x200data
                          RT_STRING0x936680x188data
                          RT_STRING0x937f00xc8data
                          RT_STRING0x938b80x350data
                          RT_STRING0x93c080x3d8data
                          RT_STRING0x93fe00x388data
                          RT_STRING0x943680x418data
                          RT_STRING0x947800x140data
                          RT_STRING0x948c00xccdata
                          RT_STRING0x9498c0x1ecdata
                          RT_STRING0x94b780x3b0data
                          RT_STRING0x94f280x354data
                          RT_STRING0x9527c0x2a4data
                          RT_RCDATA0x955200x10data
                          RT_RCDATA0x955300x2a7c2GIF image data, version 89a, 300 x 168EnglishUnited States
                          RT_RCDATA0xbfcf40x254data
                          RT_RCDATA0xbff480x3e0Delphi compiled form 'TForm1'
                          RT_GROUP_CURSOR0xc03280x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                          RT_GROUP_CURSOR0xc033c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                          RT_GROUP_CURSOR0xc03500x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                          RT_GROUP_CURSOR0xc03640x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                          RT_GROUP_CURSOR0xc03780x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                          RT_GROUP_CURSOR0xc038c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                          RT_GROUP_CURSOR0xc03a00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                          RT_GROUP_ICON0xc03b40x3edata
                          DLLImport
                          oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                          user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                          kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                          kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                          user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                          gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, Polyline, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExcludeClipRect, DeleteObject, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, BitBlt
                          version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                          kernel32.dlllstrcpyA, lstrcatA, _lread, _lopen, _llseek, _lclose, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalFindAtomA, GlobalDeleteAtom, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey, IsValidSid
                          kernel32.dllSleep
                          oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                          comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                          comdlg32.dllGetOpenFileNameA
                          URLAutodialHookCallback
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Nov 29, 2022 10:41:51.260737896 CET49694443192.168.2.313.107.43.13
                          Nov 29, 2022 10:41:51.260787964 CET4434969413.107.43.13192.168.2.3
                          Nov 29, 2022 10:41:51.260881901 CET49694443192.168.2.313.107.43.13
                          Nov 29, 2022 10:41:51.301680088 CET49694443192.168.2.313.107.43.13
                          Nov 29, 2022 10:41:51.301722050 CET4434969413.107.43.13192.168.2.3
                          Nov 29, 2022 10:41:51.396750927 CET4434969413.107.43.13192.168.2.3
                          Nov 29, 2022 10:41:51.396946907 CET49694443192.168.2.313.107.43.13
                          Nov 29, 2022 10:41:51.686289072 CET49694443192.168.2.313.107.43.13
                          Nov 29, 2022 10:41:51.686328888 CET4434969413.107.43.13192.168.2.3
                          Nov 29, 2022 10:41:51.687253952 CET4434969413.107.43.13192.168.2.3
                          Nov 29, 2022 10:41:51.687335968 CET49694443192.168.2.313.107.43.13
                          Nov 29, 2022 10:41:51.690499067 CET49694443192.168.2.313.107.43.13
                          Nov 29, 2022 10:41:51.690519094 CET4434969413.107.43.13192.168.2.3
                          Nov 29, 2022 10:41:52.246649027 CET4434969413.107.43.13192.168.2.3
                          Nov 29, 2022 10:41:52.246813059 CET4434969413.107.43.13192.168.2.3
                          Nov 29, 2022 10:41:52.246871948 CET49694443192.168.2.313.107.43.13
                          Nov 29, 2022 10:41:52.246985912 CET49694443192.168.2.313.107.43.13
                          Nov 29, 2022 10:41:52.258460045 CET49694443192.168.2.313.107.43.13
                          Nov 29, 2022 10:41:52.258503914 CET4434969413.107.43.13192.168.2.3
                          Nov 29, 2022 10:41:52.373297930 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.373383999 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.373493910 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.375330925 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.375380039 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.472461939 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.472654104 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.473560095 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.473710060 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.496169090 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.496221066 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.496706009 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.496802092 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.497447014 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.497464895 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.742984056 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.743009090 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.743072033 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.743086100 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.743117094 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.743138075 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.743154049 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.743190050 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.743197918 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.743208885 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.743266106 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.743283987 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.767354965 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.767493010 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.767518997 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.767570972 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.767627001 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.767640114 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.767678022 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.767690897 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.767709017 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.767723083 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.767776966 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.767807961 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.767818928 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.767868996 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.767869949 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.767894030 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.767936945 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.767970085 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.767982960 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.768018961 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.768029928 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.768042088 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.768094063 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.768187046 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.768193960 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.768244028 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.768263102 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.768348932 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.768362045 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.768424034 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.793473005 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.793580055 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.793592930 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.793620110 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.793670893 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.793687105 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.793699980 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.793730021 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.793749094 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.793764114 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.793796062 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.793840885 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.793847084 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.793863058 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.793920040 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.793945074 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.793955088 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.794003963 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.794007063 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.794028044 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.794070959 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.794096947 CET49695443192.168.2.313.107.43.12
                          Nov 29, 2022 10:41:52.794107914 CET4434969513.107.43.12192.168.2.3
                          Nov 29, 2022 10:41:52.794154882 CET49695443192.168.2.313.107.43.12
                          TimestampSource PortDest PortSource IPDest IP
                          Nov 29, 2022 10:41:51.199362993 CET5439753192.168.2.38.8.8.8
                          Nov 29, 2022 10:41:52.304203033 CET5932453192.168.2.38.8.8.8
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Nov 29, 2022 10:41:51.199362993 CET192.168.2.38.8.8.80x4698Standard query (0)onedrive.live.comA (IP address)IN (0x0001)false
                          Nov 29, 2022 10:41:52.304203033 CET192.168.2.38.8.8.80x7cefStandard query (0)oyuurg.ph.files.1drv.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Nov 29, 2022 10:41:51.242723942 CET8.8.8.8192.168.2.30x4698No error (0)onedrive.live.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                          Nov 29, 2022 10:41:51.242723942 CET8.8.8.8192.168.2.30x4698No error (0)l-0004.l-dc-msedge.net13.107.43.13A (IP address)IN (0x0001)false
                          Nov 29, 2022 10:41:52.369076967 CET8.8.8.8192.168.2.30x7cefNo error (0)oyuurg.ph.files.1drv.comph-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                          Nov 29, 2022 10:41:52.369076967 CET8.8.8.8192.168.2.30x7cefNo error (0)ph-files.fe.1drv.comodc-ph-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                          Nov 29, 2022 10:41:52.369076967 CET8.8.8.8192.168.2.30x7cefNo error (0)l-0003.l-dc-msedge.net13.107.43.12A (IP address)IN (0x0001)false
                          • onedrive.live.com
                          • oyuurg.ph.files.1drv.com

                          Click to jump to process

                          Target ID:0
                          Start time:10:41:46
                          Start date:29/11/2022
                          Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan-gen.31819.28757.exe
                          Imagebase:0x400000
                          File size:750592 bytes
                          MD5 hash:F536EA8FB5B6586BB2FFC764CD52ABFF
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:Borland Delphi
                          Yara matches:
                          • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000000.00000002.278011909.0000000002520000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 00000000.00000002.278530431.0000000002A2E000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:1
                          Start time:10:41:52
                          Start date:29/11/2022
                          Path:C:\Windows\SysWOW64\wscript.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\System32\wscript.exe
                          Imagebase:0x850000
                          File size:147456 bytes
                          MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.576405249.0000000010410000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.564946662.0000000004830000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                          Reputation:high

                          Target ID:2
                          Start time:10:41:56
                          Start date:29/11/2022
                          Path:C:\Windows\explorer.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Explorer.EXE
                          Imagebase:0x7ff69fe90000
                          File size:3933184 bytes
                          MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:12
                          Start time:10:42:04
                          Start date:29/11/2022
                          Path:C:\Users\Public\Libraries\Iuigzwjd.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\Public\Libraries\Iuigzwjd.exe"
                          Imagebase:0x400000
                          File size:750592 bytes
                          MD5 hash:F536EA8FB5B6586BB2FFC764CD52ABFF
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:Borland Delphi
                          Antivirus matches:
                          • Detection: 100%, Avira
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 15%, ReversingLabs
                          Reputation:low

                          Target ID:13
                          Start time:10:42:10
                          Start date:29/11/2022
                          Path:C:\Windows\SysWOW64\wscript.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\System32\wscript.exe
                          Imagebase:0x7ff68f300000
                          File size:147456 bytes
                          MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:14
                          Start time:10:42:13
                          Start date:29/11/2022
                          Path:C:\Users\Public\Libraries\Iuigzwjd.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\Public\Libraries\Iuigzwjd.exe"
                          Imagebase:0x400000
                          File size:750592 bytes
                          MD5 hash:F536EA8FB5B6586BB2FFC764CD52ABFF
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:Borland Delphi
                          Reputation:low

                          Target ID:15
                          Start time:10:42:29
                          Start date:29/11/2022
                          Path:C:\Windows\SysWOW64\wscript.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\System32\wscript.exe
                          Imagebase:0x850000
                          File size:147456 bytes
                          MD5 hash:7075DD7B9BE8807FCA93ACD86F724884
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high

                          No disassembly