Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rPaymentAdvice-PDF.exe

Overview

General Information

Sample name:rPaymentAdvice-PDF.exe
Analysis ID:1455406
MD5:cc74321fe70654e82ead4093093b0116
SHA1:68e74f568066c31b0f2b2a2837b5ce072b0857af
SHA256:8819d137ba69b96b3f3c28cca74603e86c4ecea2c821e5332452a51258176439
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: MSBuild connects to smtp port
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rPaymentAdvice-PDF.exe (PID: 3620 cmdline: "C:\Users\user\Desktop\rPaymentAdvice-PDF.exe" MD5: CC74321FE70654E82EAD4093093B0116)
    • MSBuild.exe (PID: 4196 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • WerFault.exe (PID: 5048 cmdline: C:\Windows\system32\WerFault.exe -u -p 3620 -s 1152 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.motek.ro", "Username": "office@motek.ro", "Password": "[_QR4eY?2cHe"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    00000003.00000002.3384403596.0000000002C59000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.2186188137.0000024E10C79000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.2186188137.0000024E10C79000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000003.00000002.3382092463.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 11 entries
            SourceRuleDescriptionAuthorStrings
            3.2.MSBuild.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              3.2.MSBuild.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                3.2.MSBuild.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x334d9:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x3354b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x335d5:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x33667:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x336d1:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x33743:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x337d9:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x33869:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 10 entries

                    Networking

                    barindex
                    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 212.146.84.76, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 4196, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49715
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.motek.ro", "Username": "office@motek.ro", "Password": "[_QR4eY?2cHe"}
                    Source: rPaymentAdvice-PDF.exeReversingLabs: Detection: 26%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability

                    Exploits

                    barindex
                    Source: Yara matchFile source: 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rPaymentAdvice-PDF.exe PID: 3620, type: MEMORYSTR
                    Source: rPaymentAdvice-PDF.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.Drawing.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: indoC:\Windows\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185081185.000000B9477A1000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.pdbo source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: 0C:\Windows\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185081185.000000B9477A1000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Drawing.ni.pdbRSDS source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Xml.ni.pdbRSDS# source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.Core.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: symbols\dll\System.pdb.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185081185.000000B9477A1000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2187838193.0000024E6C387000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdbll source: rPaymentAdvice-PDF.exe, 00000000.00000002.2187838193.0000024E6C387000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\mscorlib.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.pdb?lN source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA21000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: assembly\GAC_MSC:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185081185.000000B9477A1000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.Xml.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdbRSDS source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbjc' source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\Desktop\rPaymentAdvice-PDF.PDBm source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Configuration.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.Configuration.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.pdb\ source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbA source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Xml.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA21000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\dll\System.pdbp`Oq4 source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb@ source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA21000.00000004.00000020.00020000.00000000.sdmp, WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.Drawing.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb}#_ source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA21000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Core.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.pdbSystem.pdbpdbtem.pdbGAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185081185.000000B9477A1000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb* source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\dll\System.pdbc source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Core.ni.pdbRSDS source: WERFFAD.tmp.dmp.6.dr
                    Source: global trafficTCP traffic: 192.168.2.6:49715 -> 212.146.84.76:587
                    Source: global trafficTCP traffic: 192.168.2.6:55813 -> 162.159.36.2:53
                    Source: Joe Sandbox ViewASN Name: GTSCEGTSCentralEuropeAntelGermanyCZ GTSCEGTSCentralEuropeAntelGermanyCZ
                    Source: global trafficTCP traffic: 192.168.2.6:49715 -> 212.146.84.76:587
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 2.19.126.163
                    Source: unknownTCP traffic detected without corresponding DNS query: 2.19.126.163
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: mail.motek.ro
                    Source: MSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.motek.ro
                    Source: MSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://motek.ro
                    Source: MSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3383297469.0000000000F0D000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F4E000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                    Source: MSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3383297469.0000000000F0D000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F4E000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                    Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                    Source: MSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3383297469.0000000000F0D000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F4E000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: MSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3383297469.0000000000F0D000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F4E000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2186188137.0000024E10C79000.00000004.00000800.00020000.00000000.sdmp, rPaymentAdvice-PDF.exe, 00000000.00000002.2186188137.0000024E1028F000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3382092463.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, SKTzxzsJw.cs.Net Code: cOd8BoX
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.raw.unpack, SKTzxzsJw.cs.Net Code: cOd8BoX

                    System Summary

                    barindex
                    Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: rPaymentAdvice-PDF.exe
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD346849080_2_00007FFD34684908
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD3468ADD00_2_00007FFD3468ADD0
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD346831F00_2_00007FFD346831F0
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD3468B9F20_2_00007FFD3468B9F2
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD3468DB4A0_2_00007FFD3468DB4A
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD3468E3080_2_00007FFD3468E308
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD346917090_2_00007FFD34691709
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD346870070_2_00007FFD34687007
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD34680E650_2_00007FFD34680E65
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD34680EFA0_2_00007FFD34680EFA
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD3478026B0_2_00007FFD3478026B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_02A94A983_2_02A94A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_02A99B403_2_02A99B40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_02A93E803_2_02A93E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_02A9CDC03_2_02A9CDC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_02A941C83_2_02A941C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0576DD203_2_0576DD20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0576BD283_2_0576BD28
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_05769AF03_2_05769AF0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_05763F483_2_05763F48
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_05764FF83_2_05764FF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_057656D83_2_057656D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_057600403_2_05760040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0576322B3_2_0576322B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_05762AF83_2_05762AF8
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3620 -s 1152
                    Source: rPaymentAdvice-PDF.exeStatic PE information: No import functions for PE file found
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2186188137.0000024E10C79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename5522c644-5386-4d0c-b3dc-cccb0f430efa.exe4 vs rPaymentAdvice-PDF.exe
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2186188137.0000024E1028F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename5522c644-5386-4d0c-b3dc-cccb0f430efa.exe4 vs rPaymentAdvice-PDF.exe
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2186188137.0000024E1028F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUcorasewogitiwug: vs rPaymentAdvice-PDF.exe
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000000.2131800063.0000024E6C202000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIluluxove: vs rPaymentAdvice-PDF.exe
                    Source: rPaymentAdvice-PDF.exeBinary or memory string: OriginalFilenameIluluxove: vs rPaymentAdvice-PDF.exe
                    Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: rPaymentAdvice-PDF.exe, --.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA21000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb}#_
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA21000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb
                    Source: classification engineClassification label: mal100.spre.troj.spyw.expl.evad.winEXE@4/5@1/1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                    Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3620
                    Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\1f16400a-6eae-41a4-9738-e694aecad83eJump to behavior
                    Source: rPaymentAdvice-PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: rPaymentAdvice-PDF.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: rPaymentAdvice-PDF.exeReversingLabs: Detection: 26%
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeFile read: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\rPaymentAdvice-PDF.exe "C:\Users\user\Desktop\rPaymentAdvice-PDF.exe"
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3620 -s 1152
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: rPaymentAdvice-PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: rPaymentAdvice-PDF.exeStatic file information: File size 2613780 > 1048576
                    Source: rPaymentAdvice-PDF.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: rPaymentAdvice-PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.Drawing.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: indoC:\Windows\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185081185.000000B9477A1000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: mscorlib.pdbo source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: C:\Windows\Microsoft.VisualBasic.pdbpdbsic.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: 0C:\Windows\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185081185.000000B9477A1000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: System.Drawing.ni.pdbRSDS source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\dll\Microsoft.VisualBasic.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Xml.ni.pdbRSDS# source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: Microsoft.VisualBasic.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.Core.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: symbols\dll\System.pdb.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185081185.000000B9477A1000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2187838193.0000024E6C387000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.pdbll source: rPaymentAdvice-PDF.exe, 00000000.00000002.2187838193.0000024E6C387000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\mscorlib.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.pdb?lN source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA21000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: assembly\GAC_MSC:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185081185.000000B9477A1000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: Microsoft.VisualBasic.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.Xml.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\symbols\dll\Microsoft.VisualBasic.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdbRSDS source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbjc' source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Users\user\Desktop\rPaymentAdvice-PDF.PDBm source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Configuration.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: Microsoft.VisualBasic.ni.pdbRSDS& source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.Configuration.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.pdb\ source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbA source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Xml.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA21000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\dll\System.pdbp`Oq4 source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb@ source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Windows.Forms.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: mscorlib.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA21000.00000004.00000020.00020000.00000000.sdmp, WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.Drawing.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: f:\binaries\Intermediate\vb\microsoft.visualbasic.build.vbproj_731629843\objr\x86\Microsoft.VisualBasic.pdb}#_ source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA21000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Core.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: System.pdbSystem.pdbpdbtem.pdbGAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185081185.000000B9477A1000.00000004.00000010.00020000.00000000.sdmp
                    Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb* source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.ni.pdb source: WERFFAD.tmp.dmp.6.dr
                    Source: Binary string: \??\C:\Windows\dll\System.pdbc source: rPaymentAdvice-PDF.exe, 00000000.00000002.2189034686.0000024E6FA7B000.00000004.00000020.00020000.00000000.sdmp
                    Source: Binary string: System.Core.ni.pdbRSDS source: WERFFAD.tmp.dmp.6.dr
                    Source: rPaymentAdvice-PDF.exeStatic PE information: 0x864F4AF4 [Tue May 28 08:44:36 2041 UTC]
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD34686240 push edi; retn 5F4Ch0_2_00007FFD346862D6
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD34683DEE push es; ret 0_2_00007FFD34683DEF
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD3478026B push esp; retf 4810h0_2_00007FFD34780312
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeCode function: 0_2_00007FFD34781798 push eax; ret 0_2_00007FFD34781799
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: rPaymentAdvice-PDF.exe PID: 3620, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeMemory allocated: 24E6C530000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeMemory allocated: 24E6DEC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2A50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2BE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 4BE0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 2326Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 6138Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3260Thread sleep count: 2326 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -99859s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3260Thread sleep count: 6138 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -99750s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -99640s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -99526s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -99406s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -99296s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -99137s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -99031s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -98922s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -98812s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -98703s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -98594s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -98469s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -98359s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -98250s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -98140s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -98031s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -97922s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -97810s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -97703s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -97593s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -97481s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -97374s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -97263s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -97152s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -97045s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -96937s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -96827s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -96718s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -96609s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -96499s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -96390s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -96281s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -96172s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -96062s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -95953s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -95843s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -95734s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -95625s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -95515s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -95406s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5176Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99859Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99750Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99640Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99526Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99406Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99296Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99137Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 99031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98922Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98812Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98594Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98469Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98250Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98140Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 98031Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97922Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97810Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97703Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97593Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97481Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97374Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97263Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97152Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 97045Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96937Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96827Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96718Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96499Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96390Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96172Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 96062Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95843Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95625Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95515Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 95406Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Amcache.hve.6.drBinary or memory string: VMware
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
                    Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                    Source: MSBuild.exe, 00000003.00000002.3388722812.0000000005F4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll|
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: rPaymentAdvice-PDF.exe, 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: rPaymentAdvice-PDF.exe, --.csReference to suspicious API methods: LoadLibrary(_3227_A9B7_31C8(_321F_3200_3211_3215_31D3._3218_31C4_31CA_31D5_31E5_A97D_31E8_3209))
                    Source: rPaymentAdvice-PDF.exe, --.csReference to suspicious API methods: GetProcAddress(intPtr, _3227_A9B7_31C8(_321F_3200_3211_3215_31D3._3201_3207_31C3_A9B4))
                    Source: rPaymentAdvice-PDF.exe, --.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)array.Length, 64u, out _320B_3225_31E4_31C4_3223_A9B6_D7FF_3198)
                    Source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, zOS.csReference to suspicious API methods: _120HqGy.OpenProcess(_2pIt.DuplicateHandle, bInheritHandle: true, (uint)iVE.ProcessID)
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43C000Jump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43E000Jump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: A50008Jump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeQueries volume information: C:\Users\user\Desktop\rPaymentAdvice-PDF.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\rPaymentAdvice-PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3384403596.0000000002C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2186188137.0000024E10C79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3382092463.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2186188137.0000024E1028F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rPaymentAdvice-PDF.exe PID: 3620, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4196, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2186188137.0000024E10C79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3382092463.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2186188137.0000024E1028F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rPaymentAdvice-PDF.exe PID: 3620, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4196, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e10c79158.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.rPaymentAdvice-PDF.exe.24e1035a758.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3384403596.0000000002C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2186188137.0000024E10C79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3382092463.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2186188137.0000024E1028F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: rPaymentAdvice-PDF.exe PID: 3620, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4196, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    311
                    Process Injection
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    231
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    12
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    Boot or Logon Initialization Scripts1
                    DLL Side-Loading
                    151
                    Virtualization/Sandbox Evasion
                    1
                    Input Capture
                    1
                    Process Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)311
                    Process Injection
                    1
                    Credentials in Registry
                    151
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Deobfuscate/Decode Files or Information
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model2
                    Data from Local System
                    12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Obfuscated Files or Information
                    LSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Timestomp
                    Cached Domain Credentials24
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    rPaymentAdvice-PDF.exe26%ReversingLabsWin64.Trojan.GenSteal
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://motek.ro0%Avira URL Cloudsafe
                    http://x1.c.lencr.org/00%Avira URL Cloudsafe
                    http://x1.i.lencr.org/00%Avira URL Cloudsafe
                    http://r3.o.lencr.org00%Avira URL Cloudsafe
                    http://mail.motek.ro0%Avira URL Cloudsafe
                    http://r3.i.lencr.org/00%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.210.172
                    truefalse
                      unknown
                      motek.ro
                      212.146.84.76
                      truetrue
                        unknown
                        fp2e7a.wpc.phicdn.net
                        192.229.221.95
                        truefalse
                          unknown
                          mail.motek.ro
                          unknown
                          unknowntrue
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://r3.o.lencr.org0MSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3383297469.0000000000F0D000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F4E000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F7B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://upx.sf.netAmcache.hve.6.drfalse
                            • URL Reputation: safe
                            unknown
                            https://account.dyn.com/rPaymentAdvice-PDF.exe, 00000000.00000002.2186188137.0000024E10C79000.00000004.00000800.00020000.00000000.sdmp, rPaymentAdvice-PDF.exe, 00000000.00000002.2186188137.0000024E1028F000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3382092463.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://mail.motek.roMSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://motek.roMSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://x1.c.lencr.org/0MSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3383297469.0000000000F0D000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F4E000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F7B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://x1.i.lencr.org/0MSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3383297469.0000000000F0D000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F4E000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F7B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://r3.i.lencr.org/0MSBuild.exe, 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3383297469.0000000000F0D000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F4E000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.3388722812.0000000005F7B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            212.146.84.76
                            motek.roRomania
                            5588GTSCEGTSCentralEuropeAntelGermanyCZtrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1455406
                            Start date and time:2024-06-11 19:46:14 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 49s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:12
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:rPaymentAdvice-PDF.exe
                            Detection:MAL
                            Classification:mal100.spre.troj.spyw.expl.evad.winEXE@4/5@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 78%
                            • Number of executed functions: 58
                            • Number of non-executed functions: 2
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 40.113.110.67, 40.126.31.73, 40.126.31.67, 20.190.159.71, 20.190.159.23, 20.190.159.75, 20.190.159.2, 20.190.159.0, 20.190.159.4, 192.229.221.95, 104.208.16.94, 199.232.210.172, 184.28.90.27, 40.127.169.103, 52.165.164.15, 20.242.39.171
                            • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, wns.notify.trafficmanager.net, ocsp.digicert.com, login.live.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, onedsblobprdcus16.centralus.cloudapp.azure.com, glb.sls.prod.dcat.dsp.trafficmanager.net, client.wns.windows.com, prdv4a.aadg.msidentity.com, fs.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            • VT rate limit hit for: rPaymentAdvice-PDF.exe
                            TimeTypeDescription
                            13:47:10API Interceptor42x Sleep call for process: MSBuild.exe modified
                            13:47:13API Interceptor1x Sleep call for process: WerFault.exe modified
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            bg.microsoft.map.fastly.netzb1.exeGet hashmaliciousUnknownBrowse
                            • 199.232.210.172
                            https://drive.google.com/file/d/1rUX5pF_yChUfocjQZEgSZVDbnTsCbsyI/view?usp=sharing_eil_m&ts=66679781Get hashmaliciousUnknownBrowse
                            • 199.232.210.172
                            https://workspace.cftc.gov/cedc903c-09bb-4a95-bb76-9b133af0550f/?action=replyGet hashmaliciousUnknownBrowse
                            • 199.232.210.172
                            file.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                            • 199.232.210.172
                            https://mcfp.felk.cvut.czGet hashmaliciousPhisherBrowse
                            • 199.232.210.172
                            https://info.virtualhealth.com/e3t/Ctc/GB+113/cmmfD04/VWRD9T8N6WzjN8MJTHvTlRp-W842MfZ5g9NL_N6-TN-l3qgyTW7Y8-PT6lZ3mfW56Rjx787zhFxW4_YPND6r6flrW4BlJlg1DphdCVWC28Z4PpMbRW6GGMRN2bfpFdW7hSWPP6KFbcRW4PBy7c6n3dRqN7ztR5NtV-d9W1y6F6Z799h-lN1ZbvtmQ73TLW5ShFj48-W2NPW1L2f016vN6bSW45yp6K7Xp_V9W1fy0nl6xLNR_N5n9x3txmtWFN2nZ6w9QgWwJW1rlxcq4rmPQZW2D31f_3FjFXjN7D51x8lx574V_S2G96X3V3rW3xJHsh5zkBZjW6M_Gg24KcjVwW2wm07P9jh6znVyVtyJ6VBB3ZW80wlHc6H0YX2W1stJK56XtGc2f45z9Cx04Get hashmaliciousUnknownBrowse
                            • 199.232.214.172
                            http://www.tlyrxy.skyliexhys.comGet hashmaliciousUnknownBrowse
                            • 199.232.214.172
                            http://www.tlyrxy.skyliexhys.comGet hashmaliciousUnknownBrowse
                            • 199.232.214.172
                            https://deyangming.angebotfilesoffer.top/Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                            • 199.232.210.172
                            https://thetechglitch.com/Get hashmaliciousUnknownBrowse
                            • 199.232.214.172
                            fp2e7a.wpc.phicdn.nethttps://34.75.2o2.lol/XZXlZcys3Y0lMeE9qTWRaYisvV2ozVCtKTk9jbmZUSEdiYTZpTS9BYmpHY1I5Q3lSanAxam16TnE1Ly8zaitNeWxyTzBVQWhCS1VjcExjT0xsb284a2FQR1RLMkF3NGpiOVVvVHp4R2h6M3NmOWRIQmlQdmY2clJOcm11TXM2TDNadXUrUGxmclIwVGpyc3ViVndCME9RWXltbDl4QkZiNDVqRUhuVzNpZCs1cmNhS0s2bVk1ZWY3K0VCTG5FQzByWWJBTU53TGVvSjV2MXFBMitJQmgtLUNmdVg1bG1UOGdhbzNBaTQtLU9YTW5YNHNaYnFhVDM5V3BKaGVUZWc9PQ==?cid=2059126474Get hashmaliciousUnknownBrowse
                            • 192.229.221.95
                            https://drive.google.com/file/d/1rUX5pF_yChUfocjQZEgSZVDbnTsCbsyI/view?usp=sharing_eil_m&ts=66679781Get hashmaliciousUnknownBrowse
                            • 192.229.221.95
                            file.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                            • 192.229.221.95
                            https://workspace.cftc.gov/cedc903c-09bb-4a95-bb76-9b133af0550f/?action=replyGet hashmaliciousUnknownBrowse
                            • 192.229.221.95
                            http://www.chanamais.com/Get hashmaliciousUnknownBrowse
                            • 192.229.221.95
                            file.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                            • 192.229.221.95
                            https://na2.docusign.net/Member/EmailStart.aspx?a=d9cc73d9-ae0f-4253-a792-b28e8e553025&acct=61cb9522-75f6-4286-9c9e-e0f21cfcb28c&er=7c01d5b5-65de-4226-821a-b71d7d0d5623&c=E,1,Js_dcjgNrYNrel1HuUzofphnyLHztW0huM_6dgU6JXOMHy6LrFNyRz9u0XbDVY5U7gRSOASLaSlWJc5pS8NIpp_k-HIIGeO2F0BtBCErZxdMks2Qmw,,&typo=1Get hashmaliciousUnknownBrowse
                            • 192.229.221.95
                            https://mcfp.felk.cvut.czGet hashmaliciousPhisherBrowse
                            • 192.229.221.95
                            https://info.virtualhealth.com/e3t/Ctc/GB+113/cmmfD04/VWRD9T8N6WzjN8MJTHvTlRp-W842MfZ5g9NL_N6-TN-l3qgyTW7Y8-PT6lZ3mfW56Rjx787zhFxW4_YPND6r6flrW4BlJlg1DphdCVWC28Z4PpMbRW6GGMRN2bfpFdW7hSWPP6KFbcRW4PBy7c6n3dRqN7ztR5NtV-d9W1y6F6Z799h-lN1ZbvtmQ73TLW5ShFj48-W2NPW1L2f016vN6bSW45yp6K7Xp_V9W1fy0nl6xLNR_N5n9x3txmtWFN2nZ6w9QgWwJW1rlxcq4rmPQZW2D31f_3FjFXjN7D51x8lx574V_S2G96X3V3rW3xJHsh5zkBZjW6M_Gg24KcjVwW2wm07P9jh6znVyVtyJ6VBB3ZW80wlHc6H0YX2W1stJK56XtGc2f45z9Cx04Get hashmaliciousUnknownBrowse
                            • 192.229.221.95
                            https://rrohlo.ac-page.com/paymentconfirmationGet hashmaliciousHTMLPhisherBrowse
                            • 192.229.221.95
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            GTSCEGTSCentralEuropeAntelGermanyCZOrdine_nr.24061168372.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 185.146.87.128
                            pilnie wymagana wycena dlaprojektu suwalki (1).vbsGet hashmaliciousGuLoaderBrowse
                            • 109.205.90.147
                            QSX0atAPpN.elfGet hashmaliciousMiraiBrowse
                            • 91.120.152.19
                            YfM6hAPQaS.elfGet hashmaliciousMiraiBrowse
                            • 94.42.225.10
                            9W8C6mXhAB.elfGet hashmaliciousMiraiBrowse
                            • 94.42.250.26
                            mpsl.elfGet hashmaliciousMiraiBrowse
                            • 46.13.53.8
                            SMLUVN#U00cd FORMUL#U00c1#U0158-pdf.pif.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 31.14.12.234
                            5dzdxe7bVc.elfGet hashmaliciousMiraiBrowse
                            • 194.213.46.247
                            ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 185.146.87.128
                            td2RgV6HyP.exeGet hashmaliciousSystemBCBrowse
                            • 188.240.2.189
                            No context
                            No context
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.1634753436511065
                            Encrypted:false
                            SSDEEP:192:JCr0ofla1Oi0VeWpRaWz3S9l/gCZFv82zuiFFZ24lO8r:O0otaSVBpRa4ifE2zuiFFY4lO8r
                            MD5:AA2997089778CAEEAF45A5A0C048CD82
                            SHA1:417FDBC31B73AD59B98D6BD7AB46653140FEAB6D
                            SHA-256:A4C5607BF4A8E60A61D3E24CD6F75C63776D009AB4DBA6358A87AA5A8AF27D69
                            SHA-512:D175AEAFB53462AF13A22234B096A070DF9E84F530A380D522ED05565BF79926CB1C2B5F57B5D4DB378F5498F7FF50EBE921DBA42F4E1CC999C7957C12068515
                            Malicious:false
                            Reputation:low
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.2.6.0.1.6.2.9.8.2.9.4.6.3.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.2.6.0.1.6.3.0.5.1.6.9.7.0.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.a.2.a.b.c.5.b.-.2.3.2.3.-.4.5.1.c.-.b.1.6.b.-.9.0.c.9.e.3.e.f.8.b.e.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.5.3.1.b.f.8.b.-.3.5.b.f.-.4.e.c.a.-.9.4.4.9.-.6.8.b.8.2.2.a.4.7.4.c.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.P.a.y.m.e.n.t.A.d.v.i.c.e.-.P.D.F...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.l.u.l.u.x.o.v.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.e.2.4.-.0.0.0.1.-.0.0.1.5.-.f.1.a.a.-.0.1.6.1.2.7.b.c.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.0.8.9.a.1.2.b.8.4.4.0.8.5.b.7.2.c.7.c.2.3.2.1.8.a.7.0.e.a.d.6.0.0.0.0.0.0.0.0.!.0.0.0.0.6.8.e.7.4.f.5.6.8.0.6.6.c.3.1.b.0.f.2.b.2.a.2.8.3.7.b.5.c.e.0.7.2.b.0.8.5.7.a.f.!.r.P.a.y.m.e.
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8912
                            Entropy (8bit):3.711066349047004
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJ91ZPwJ6Y2D97gogmfZIS0epr089bU4DfaR8m:R6lXJ/ZP26Yg7gogmffbUEfaf
                            MD5:59A852A989183917C29247C244E8F0F2
                            SHA1:015CCDB4F81E915B1E076FEB07953B75795A68A8
                            SHA-256:0EAC9AFA8355701203BC37471F7AD229EDC961005DAD526FC0FC67F8A005484C
                            SHA-512:98172C8FC3F1BA969E0364C90E748F51A976C0E24E88D9AB468FC2F97058E916C701250BC9A050E3C9358A93AC38AA0E47D0D809165599FEACE7DAC4047FACBB
                            Malicious:false
                            Reputation:low
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.6.2.0.<./.P.i.
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4857
                            Entropy (8bit):4.524786232894984
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsjJg771I9FCWpW8VY85Ym8M4J6sE6FNTeTyq8v5sET5dhIBOd:uIjf9I7uD7VToJmyeTW71zIAd
                            MD5:2E03A5ABEB34B02A176BF99BC6788267
                            SHA1:B3B5B7B2DCB99F83BED61D32A8D2AA9DBF7DD59F
                            SHA-256:7A7A38EFCAC650A4271A870FCB136A5D94A3319322AB3BEDF306FE9FA40E4C1D
                            SHA-512:1AE1BA186ADE2FCCCC29186E5088D44547B236B542777A620A2DA9D6C10821229D2981AE3B2EE9B025F8215F4D7E55550367505A7BF3D1FCCDF08429F6AD74CF
                            Malicious:false
                            Reputation:low
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="363409" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:Mini DuMP crash report, 16 streams, Tue Jun 11 17:47:10 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):482481
                            Entropy (8bit):3.585596037280979
                            Encrypted:false
                            SSDEEP:6144:T8gYzePoqUH0W3QwXTw5zqkbhbkQN3o9mVFIK0/xng:BYjqUH0WQwXTib3Cg
                            MD5:D5D8C8B60558EBCABBB2D7334A052133
                            SHA1:A48BB031B595B41EC53EECF513663B8A9A140268
                            SHA-256:D0ABA6D32D2A5B453121084F7C41E56AD4857767C44AB3730DAE9DF0D6248054
                            SHA-512:5750AA48516B1E818159963E87A250ECCF92B531C9F5EA6F020E357935738405316820B2DA67DBD477CB1561E518C62CBA99998103FBC5A556AB579A69E84C39
                            Malicious:false
                            Reputation:low
                            Preview:MDMP..a..... .........hf............................4.......$.... ......."... ......TX..X...........l.......8...........T...........`-..Q/...........C...........E..............................................................................eJ......LF......Lw......................T.......$.....hf.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.4691333758830405
                            Encrypted:false
                            SSDEEP:6144:kzZfpi6ceLPx9skLmb0fLZWSP3aJG8nAgeiJRMMhA2zX4WABluuNFjDH5S:KZHtLZWOKnMM6bFpXj4
                            MD5:7CA0E16B29C77E2DB0E87B5E32FE91A3
                            SHA1:A7C1C47D8EB5F480DE6E403B2EC33380035D0FFA
                            SHA-256:656283DD1E542EFA3726274374346E12F9A4A62AC2C38CC4B856711E68742020
                            SHA-512:AE45B769DC53F96D9326AE0565BFEF091EEA5812ECBD3890928B51939947F5F93DE32E67DBBD624A97A202EF6CCD3512AF1810A4A2689389614065F57057CEF8
                            Malicious:false
                            Reputation:low
                            Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..&b'...............................................................................................................................................................................................................................................................................................................................................+.1V........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):4.745052609995144
                            TrID:
                            • Win64 Executable GUI Net Framework (217006/5) 49.88%
                            • Win64 Executable GUI (202006/5) 46.43%
                            • Win64 Executable (generic) (12005/4) 2.76%
                            • Generic Win/DOS Executable (2004/3) 0.46%
                            • DOS Executable Generic (2002/1) 0.46%
                            File name:rPaymentAdvice-PDF.exe
                            File size:2'613'780 bytes
                            MD5:cc74321fe70654e82ead4093093b0116
                            SHA1:68e74f568066c31b0f2b2a2837b5ce072b0857af
                            SHA256:8819d137ba69b96b3f3c28cca74603e86c4ecea2c821e5332452a51258176439
                            SHA512:e02dc05c21788129ee7509daf307b48632fb76d72ad0c01bd5bae78962a0e3c5b3e78052ca6db9a5f5d31d7b3e3ccbc77385a28a62b208385158a5852d897214
                            SSDEEP:12288:KP6pSfs5iMrbVM48GaHeRlPKlBEM9JVmkGkJ+yXiR0kVOmPiBR6y:KSIfspZRaHUlCR9JVYci05m6BR6y
                            TLSH:C2C51155B263AE4BFC9A4275D4E034F109FD6D2331FAA25FEF821CA691927FC02446B1
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....JO..........."...0.]................ ....@...... ....................................`................................
                            Icon Hash:00928e8e8686b000
                            Entrypoint:0x400000
                            Entrypoint Section:
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x864F4AF4 [Tue May 28 08:44:36 2041 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:
                            Instruction
                            dec ebp
                            pop edx
                            nop
                            add byte ptr [ebx], al
                            add byte ptr [eax], al
                            add byte ptr [eax+eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x9e4.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb1a00x38.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x925d0x940080f737d13de9c0324f797a5829ca123aFalse0.5640836148648649data6.371425468205272IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0xc0000x9e40xa00de6ce812b86c1485eea247616e078f5dFalse0.31171875data4.127915122439665IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_VERSION0xc0b80x3a0data0.4859913793103448
                            RT_VERSION0xc4580x3a0dataEnglishUnited States0.4870689655172414
                            RT_MANIFEST0xc7f80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 11, 2024 19:47:05.364284039 CEST49674443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:05.364284039 CEST49673443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:05.692512989 CEST49672443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:11.651597977 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:11.656829119 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:11.657011986 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:12.677642107 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:12.678028107 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:12.688040018 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:12.951570034 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:12.951874971 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:12.956803083 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:13.221443892 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:13.225975037 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:13.230818033 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:13.503258944 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:13.503304958 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:13.503340960 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:13.503376961 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:13.503391027 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:13.503443956 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:13.563231945 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:13.568075895 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:13.831501007 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:13.843555927 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:13.848407030 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:14.112457037 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:14.116955042 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:14.123064995 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:14.387032032 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:14.399949074 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:14.404999018 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:14.966567993 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:14.966928005 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:14.971720934 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:14.973642111 CEST49673443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:14.973720074 CEST49674443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:15.235213041 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:15.235557079 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:15.240367889 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:15.301764011 CEST49672443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:15.633728981 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:15.633955002 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:15.638840914 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:15.901952028 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:15.902702093 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:15.902792931 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:15.902867079 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:15.902867079 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:15.907566071 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:15.907623053 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:15.907766104 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:15.907932997 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:16.205813885 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:47:16.254925966 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:47:25.995182037 CEST49705443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:25.995559931 CEST49724443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:25.995610952 CEST44349724173.222.162.64192.168.2.6
                            Jun 11, 2024 19:47:25.995846033 CEST49724443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:25.995923042 CEST49724443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:25.995939016 CEST44349724173.222.162.64192.168.2.6
                            Jun 11, 2024 19:47:26.000179052 CEST44349705173.222.162.64192.168.2.6
                            Jun 11, 2024 19:47:27.010385990 CEST44349724173.222.162.64192.168.2.6
                            Jun 11, 2024 19:47:27.010456085 CEST49724443192.168.2.6173.222.162.64
                            Jun 11, 2024 19:47:52.217619896 CEST5581353192.168.2.6162.159.36.2
                            Jun 11, 2024 19:47:52.223841906 CEST5355813162.159.36.2192.168.2.6
                            Jun 11, 2024 19:47:52.223947048 CEST5581353192.168.2.6162.159.36.2
                            Jun 11, 2024 19:47:52.223985910 CEST5581353192.168.2.6162.159.36.2
                            Jun 11, 2024 19:47:52.229672909 CEST5355813162.159.36.2192.168.2.6
                            Jun 11, 2024 19:47:52.865334988 CEST5355813162.159.36.2192.168.2.6
                            Jun 11, 2024 19:47:52.866178989 CEST5581353192.168.2.6162.159.36.2
                            Jun 11, 2024 19:47:52.871273041 CEST5355813162.159.36.2192.168.2.6
                            Jun 11, 2024 19:47:52.871339083 CEST5581353192.168.2.6162.159.36.2
                            Jun 11, 2024 19:48:45.146063089 CEST4970480192.168.2.62.19.126.163
                            Jun 11, 2024 19:48:45.153090000 CEST80497042.19.126.163192.168.2.6
                            Jun 11, 2024 19:48:45.153306961 CEST4970480192.168.2.62.19.126.163
                            Jun 11, 2024 19:48:51.552035093 CEST49715587192.168.2.6212.146.84.76
                            Jun 11, 2024 19:48:51.557054996 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:48:51.820661068 CEST58749715212.146.84.76192.168.2.6
                            Jun 11, 2024 19:48:51.825716972 CEST49715587192.168.2.6212.146.84.76
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 11, 2024 19:47:11.533725977 CEST6535353192.168.2.61.1.1.1
                            Jun 11, 2024 19:47:11.625935078 CEST53653531.1.1.1192.168.2.6
                            Jun 11, 2024 19:47:52.216974974 CEST5352537162.159.36.2192.168.2.6
                            Jun 11, 2024 19:47:52.884290934 CEST53583031.1.1.1192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jun 11, 2024 19:47:11.533725977 CEST192.168.2.61.1.1.10x6434Standard query (0)mail.motek.roA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jun 11, 2024 19:47:11.625935078 CEST1.1.1.1192.168.2.60x6434No error (0)mail.motek.romotek.roCNAME (Canonical name)IN (0x0001)false
                            Jun 11, 2024 19:47:11.625935078 CEST1.1.1.1192.168.2.60x6434No error (0)motek.ro212.146.84.76A (IP address)IN (0x0001)false
                            Jun 11, 2024 19:47:12.739255905 CEST1.1.1.1192.168.2.60x8d0aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                            Jun 11, 2024 19:47:12.739255905 CEST1.1.1.1192.168.2.60x8d0aNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                            Jun 11, 2024 19:47:14.076679945 CEST1.1.1.1192.168.2.60x90a4No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                            Jun 11, 2024 19:47:14.076679945 CEST1.1.1.1192.168.2.60x90a4No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                            TimestampSource PortDest PortSource IPDest IPCommands
                            Jun 11, 2024 19:47:12.677642107 CEST58749715212.146.84.76192.168.2.6220-server30.romania-webhosting.com ESMTP Exim 4.96.2 #2 Tue, 11 Jun 2024 20:47:11 +0300
                            220-We do not authorize the use of this system to transport unsolicited,
                            220 and/or bulk e-mail.
                            Jun 11, 2024 19:47:12.678028107 CEST49715587192.168.2.6212.146.84.76EHLO 284992
                            Jun 11, 2024 19:47:12.951570034 CEST58749715212.146.84.76192.168.2.6250-server30.romania-webhosting.com Hello 284992 [173.254.250.91]
                            250-SIZE 52428800
                            250-8BITMIME
                            250-PIPELINING
                            250-PIPECONNECT
                            250-AUTH PLAIN LOGIN
                            250-STARTTLS
                            250 HELP
                            Jun 11, 2024 19:47:12.951874971 CEST49715587192.168.2.6212.146.84.76STARTTLS
                            Jun 11, 2024 19:47:13.221443892 CEST58749715212.146.84.76192.168.2.6220 TLS go ahead

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:13:47:07
                            Start date:11/06/2024
                            Path:C:\Users\user\Desktop\rPaymentAdvice-PDF.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\rPaymentAdvice-PDF.exe"
                            Imagebase:0x24e6c200000
                            File size:2'613'780 bytes
                            MD5 hash:CC74321FE70654E82EAD4093093B0116
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2185470097.0000024E00385000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2186188137.0000024E10C79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2186188137.0000024E10C79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2186188137.0000024E1028F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2186188137.0000024E1028F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:3
                            Start time:13:47:09
                            Start date:11/06/2024
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                            Imagebase:0x8e0000
                            File size:262'432 bytes
                            MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3384403596.0000000002C59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3382092463.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3382092463.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3384403596.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:moderate
                            Has exited:false

                            Target ID:6
                            Start time:13:47:09
                            Start date:11/06/2024
                            Path:C:\Windows\System32\WerFault.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\WerFault.exe -u -p 3620 -s 1152
                            Imagebase:0x7ff70f970000
                            File size:570'736 bytes
                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >