Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RQ#0000081024.exe

Overview

General Information

Sample name:RQ#0000081024.exe
Analysis ID:1530843
MD5:afda2fbebda1a749606f6ce43c8a5f80
SHA1:1da6ec72807e777b861da6f7c5da4649d602c9f3
SHA256:3bc0fd76571c3ba9e61ad10154498bf6a55e95bf15980cd5b63b427581d20350
Infos:

Detection

FormBook
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • RQ#0000081024.exe (PID: 4480 cmdline: "C:\Users\user\Desktop\RQ#0000081024.exe" MD5: AFDA2FBEBDA1A749606F6CE43C8A5F80)
    • svchost.exe (PID: 5296 cmdline: "C:\Users\user\Desktop\RQ#0000081024.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.1728497714.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000001.00000002.1728497714.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2fb73:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x17b72:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000001.00000002.1733062546.0000000003740000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000001.00000002.1733062546.0000000003740000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2c4d0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x144cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\RQ#0000081024.exe", CommandLine: "C:\Users\user\Desktop\RQ#0000081024.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RQ#0000081024.exe", ParentImage: C:\Users\user\Desktop\RQ#0000081024.exe, ParentProcessId: 4480, ParentProcessName: RQ#0000081024.exe, ProcessCommandLine: "C:\Users\user\Desktop\RQ#0000081024.exe", ProcessId: 5296, ProcessName: svchost.exe
      Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\RQ#0000081024.exe", CommandLine: "C:\Users\user\Desktop\RQ#0000081024.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RQ#0000081024.exe", ParentImage: C:\Users\user\Desktop\RQ#0000081024.exe, ParentProcessId: 4480, ParentProcessName: RQ#0000081024.exe, ProcessCommandLine: "C:\Users\user\Desktop\RQ#0000081024.exe", ProcessId: 5296, ProcessName: svchost.exe
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: RQ#0000081024.exeReversingLabs: Detection: 79%
      Source: Yara matchFile source: 00000001.00000002.1728497714.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.1733062546.0000000003740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: RQ#0000081024.exeJoe Sandbox ML: detected
      Source: RQ#0000081024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: Binary string: wntdll.pdbUGP source: RQ#0000081024.exe, 00000000.00000003.1684774258.0000000004730000.00000004.00001000.00020000.00000000.sdmp, RQ#0000081024.exe, 00000000.00000003.1683958108.0000000004590000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1733124909.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1733124909.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1690708168.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1688661384.0000000003600000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: RQ#0000081024.exe, 00000000.00000003.1684774258.0000000004730000.00000004.00001000.00020000.00000000.sdmp, RQ#0000081024.exe, 00000000.00000003.1683958108.0000000004590000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1733124909.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1733124909.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1690708168.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1688661384.0000000003600000.00000004.00000020.00020000.00000000.sdmp

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000001.00000002.1728497714.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.1733062546.0000000003740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000001.00000002.1728497714.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
      Source: 00000001.00000002.1733062546.0000000003740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
      Source: RQ#0000081024.exe, 00000000.00000003.1682797234.000000000485D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RQ#0000081024.exe
      Source: RQ#0000081024.exe, 00000000.00000003.1683958108.00000000046B3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RQ#0000081024.exe
      Source: RQ#0000081024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: 00000001.00000002.1728497714.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
      Source: 00000001.00000002.1733062546.0000000003740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
      Source: classification engineClassification label: mal84.troj.evad.winEXE@3/1@0/0
      Source: C:\Users\user\Desktop\RQ#0000081024.exeFile created: C:\Users\user\AppData\Local\Temp\outvauntsJump to behavior
      Source: RQ#0000081024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\RQ#0000081024.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: RQ#0000081024.exeReversingLabs: Detection: 79%
      Source: C:\Users\user\Desktop\RQ#0000081024.exeFile read: C:\Users\user\Desktop\RQ#0000081024.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\RQ#0000081024.exe "C:\Users\user\Desktop\RQ#0000081024.exe"
      Source: C:\Users\user\Desktop\RQ#0000081024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RQ#0000081024.exe"
      Source: C:\Users\user\Desktop\RQ#0000081024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RQ#0000081024.exe"Jump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
      Source: RQ#0000081024.exeStatic file information: File size 1330145 > 1048576
      Source: Binary string: wntdll.pdbUGP source: RQ#0000081024.exe, 00000000.00000003.1684774258.0000000004730000.00000004.00001000.00020000.00000000.sdmp, RQ#0000081024.exe, 00000000.00000003.1683958108.0000000004590000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1733124909.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1733124909.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1690708168.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1688661384.0000000003600000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: RQ#0000081024.exe, 00000000.00000003.1684774258.0000000004730000.00000004.00001000.00020000.00000000.sdmp, RQ#0000081024.exe, 00000000.00000003.1683958108.0000000004590000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1733124909.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.1733124909.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1690708168.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.1688661384.0000000003600000.00000004.00000020.00020000.00000000.sdmp
      Source: RQ#0000081024.exeStatic PE information: real checksum: 0xa2135 should be: 0x150ea1

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\RQ#0000081024.exeAPI/Special instruction interceptor: Address: 3F2153C
      Source: C:\Windows\SysWOW64\svchost.exe TID: 2840Thread sleep time: -30000s >= -30000sJump to behavior
      Source: RQ#0000081024.exe, 00000000.00000003.1684972198.0000000000A70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
      Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\RQ#0000081024.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F33008Jump to behavior
      Source: C:\Users\user\Desktop\RQ#0000081024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RQ#0000081024.exe"Jump to behavior
      Source: RQ#0000081024.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000001.00000002.1728497714.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.1733062546.0000000003740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000001.00000002.1728497714.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.1733062546.0000000003740000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      212
      Process Injection
      2
      Virtualization/Sandbox Evasion
      OS Credential Dumping111
      Security Software Discovery
      Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      212
      Process Injection
      LSASS Memory2
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account Manager2
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
      File and Directory Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      RQ#0000081024.exe79%ReversingLabsWin32.Trojan.AutoitInject
      RQ#0000081024.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1530843
      Start date and time:2024-10-10 15:49:33 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 2m 18s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:2
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:RQ#0000081024.exe
      Detection:MAL
      Classification:mal84.troj.evad.winEXE@3/1@0/0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Stop behavior analysis, all processes terminated
      • VT rate limit hit for: RQ#0000081024.exe
      TimeTypeDescription
      09:50:27API Interceptor3x Sleep call for process: svchost.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\RQ#0000081024.exe
      File Type:data
      Category:dropped
      Size (bytes):289792
      Entropy (8bit):7.9962947853131405
      Encrypted:true
      SSDEEP:6144:e6kW7m2Z3dn6XEKojdOwSyA77AfqWaUlx+2Fljg7dW:eZk6XErSyAAiWaUrbjg5W
      MD5:2826FE8397C33344C95A30D564CD21B9
      SHA1:823C8D81F7F1EC66014AE93A4CA8F58C18B4AB4A
      SHA-256:9D10BE022ECEF701D45AA89D661170E87635695355A6DFCADF2E3A32D4530C12
      SHA-512:861462F57F402B29924942777C6D9E62845A2CA92433B221A58335545234023EBA4869722C037EDBF18BFED1E15C28678AA6CDF050CC5BF1CD2996111AB44E71
      Malicious:false
      Reputation:low
      Preview:.....R6AS...K....h.E5..|7D...MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3.DAPIM.OS.Q.c.3..ua-_<w)&[+:&^m' >)=Ba13xB7!.9_tq.eo:60QbEJ9iDAPGR6A*WQ../U..4R../0.N..}S*.[...!4.B...0V.g,U'j93.LHG3MDAP..6A.WY00...1T5E6OWY.4NIL2FDA.CR6ASVX0BO.D1T5U6OW)P4LH.3MTAPGP6AUVX0BO2P7T5E6OWYTDHHG1MDAPGR4A..X0RO2@1T5E&OWIT4LHG3]DAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0l;W(ET5E..SYT$LHGiIDA@GR6ASVX0BO2P1T.E6/WYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASVX0BO2P1T5E6OWYT4LHG3MDAPGR6ASV
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):7.5133798301143555
      TrID:
      • Win32 Executable (generic) a (10002005/4) 95.11%
      • AutoIt3 compiled script executable (510682/80) 4.86%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:RQ#0000081024.exe
      File size:1'330'145 bytes
      MD5:afda2fbebda1a749606f6ce43c8a5f80
      SHA1:1da6ec72807e777b861da6f7c5da4649d602c9f3
      SHA256:3bc0fd76571c3ba9e61ad10154498bf6a55e95bf15980cd5b63b427581d20350
      SHA512:400ba3074e79c56ab23675cca1b2146206228a79c855936c028d73098b8fa7a86b0ae223a5f78af2a334593ae3833f4e2b3377bb070c2fcb4f7b9d13ad453d4c
      SSDEEP:24576:ffmMv6Ckr7Mny5QLkoXdnuQNDxnElrR4WKLe/lLoEj1oWZ106q:f3v+7/5QLkoNuQhx2DF/ZOWZ1q
      TLSH:1755F112F7D680B6EDA33971293BE32ADB3575194337C48BA7E02E778E211409B36761
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
      Icon Hash:1733312925935517
      Entrypoint:0x416310
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      DLL Characteristics:TERMINAL_SERVER_AWARE
      Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:0
      File Version Major:5
      File Version Minor:0
      Subsystem Version Major:5
      Subsystem Version Minor:0
      Import Hash:aaaa8913c89c8aa4a5d93f06853894da
      Instruction
      call 00007F2814E7487Ch
      jmp 00007F2814E6864Eh
      int3
      int3
      int3
      int3
      int3
      int3
      push ebp
      mov ebp, esp
      push edi
      push esi
      mov esi, dword ptr [ebp+0Ch]
      mov ecx, dword ptr [ebp+10h]
      mov edi, dword ptr [ebp+08h]
      mov eax, ecx
      mov edx, ecx
      add eax, esi
      cmp edi, esi
      jbe 00007F2814E687DAh
      cmp edi, eax
      jc 00007F2814E6897Ah
      cmp ecx, 00000100h
      jc 00007F2814E687F1h
      cmp dword ptr [004A94E0h], 00000000h
      je 00007F2814E687E8h
      push edi
      push esi
      and edi, 0Fh
      and esi, 0Fh
      cmp edi, esi
      pop esi
      pop edi
      jne 00007F2814E687DAh
      pop esi
      pop edi
      pop ebp
      jmp 00007F2814E68C3Ah
      test edi, 00000003h
      jne 00007F2814E687E7h
      shr ecx, 02h
      and edx, 03h
      cmp ecx, 08h
      jc 00007F2814E687FCh
      rep movsd
      jmp dword ptr [00416494h+edx*4]
      nop
      mov eax, edi
      mov edx, 00000003h
      sub ecx, 04h
      jc 00007F2814E687DEh
      and eax, 03h
      add ecx, eax
      jmp dword ptr [004163A8h+eax*4]
      jmp dword ptr [004164A4h+ecx*4]
      nop
      jmp dword ptr [00416428h+ecx*4]
      nop
      mov eax, E4004163h
      arpl word ptr [ecx+00h], ax
      or byte ptr [ecx+eax*2+00h], ah
      and edx, ecx
      mov al, byte ptr [esi]
      mov byte ptr [edi], al
      mov al, byte ptr [esi+01h]
      mov byte ptr [edi+01h], al
      mov al, byte ptr [esi+02h]
      shr ecx, 02h
      mov byte ptr [edi+02h], al
      add esi, 03h
      add edi, 03h
      cmp ecx, 08h
      jc 00007F2814E6879Eh
      Programming Language:
      • [ASM] VS2008 SP1 build 30729
      • [ C ] VS2008 SP1 build 30729
      • [C++] VS2008 SP1 build 30729
      • [ C ] VS2005 build 50727
      • [IMP] VS2005 build 50727
      • [ASM] VS2008 build 21022
      • [RES] VS2008 build 21022
      • [LNK] VS2008 SP1 build 30729
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9298.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0xab0000x92980x9400f6be76de0ef2c68f397158bf01bdef3eFalse0.4896801097972973data5.530303089784181IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
      RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
      RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
      RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
      RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
      RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
      RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
      RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
      RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
      RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
      RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
      RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
      RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
      RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
      RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
      RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
      RT_STRING0xb28380x43adataEnglishGreat Britain0.3733826247689464
      RT_STRING0xb2c780x5fcdataEnglishGreat Britain0.3087467362924282
      RT_STRING0xb32780x65cdataEnglishGreat Britain0.34336609336609336
      RT_STRING0xb38d80x388dataEnglishGreat Britain0.377212389380531
      RT_STRING0xb3c600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
      RT_GROUP_ICON0xb3db80x84dataEnglishGreat Britain0.6439393939393939
      RT_GROUP_ICON0xb3e400x14dataEnglishGreat Britain1.15
      RT_GROUP_ICON0xb3e580x14dataEnglishGreat Britain1.25
      RT_GROUP_ICON0xb3e700x14dataEnglishGreat Britain1.25
      RT_VERSION0xb3e880x19cdataEnglishGreat Britain0.5339805825242718
      RT_MANIFEST0xb40280x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
      DLLImport
      WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
      VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
      COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
      MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
      PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
      USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
      KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
      USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
      GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
      ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
      SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
      ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
      OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
      Language of compilation systemCountry where language is spokenMap
      EnglishGreat Britain
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:09:50:22
      Start date:10/10/2024
      Path:C:\Users\user\Desktop\RQ#0000081024.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\RQ#0000081024.exe"
      Imagebase:0x400000
      File size:1'330'145 bytes
      MD5 hash:AFDA2FBEBDA1A749606F6CE43C8A5F80
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:09:50:25
      Start date:10/10/2024
      Path:C:\Windows\SysWOW64\svchost.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\RQ#0000081024.exe"
      Imagebase:0x7a0000
      File size:46'504 bytes
      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1728497714.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1728497714.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.1733062546.0000000003740000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000001.00000002.1733062546.0000000003740000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
      Reputation:high
      Has exited:true

      No disassembly