Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Whatsapp-GUI.exe

Overview

General Information

Sample name:Whatsapp-GUI.exe
Analysis ID:1575235
MD5:8c3ef2eba970f543f0ebe6dced908402
SHA1:431157eaf15244e5d8cc167511b4611f4dfae85c
SHA256:9e4f036dd6fbb45ce414cb5d040b3255b5ccc9ecacbfaf022b631545f9a19a02
Tags:DarkGateexeuser-smica83
Infos:

Detection

DarkGate, MailPassView
Score:69
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:63
Range:0 - 100

Signatures

Found malware configuration
Yara detected DarkGate
Yara detected MailPassView
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates autostart registry keys with suspicious names
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Whatsapp-GUI.exe (PID: 7316 cmdline: "C:\Users\user\Desktop\Whatsapp-GUI.exe" MD5: 8C3EF2EBA970F543F0EBE6DCED908402)
    • UpdaterService.exe (PID: 7636 cmdline: "C:\ProgramData\Updater\UpdaterService.exe" "C:\ProgramData\Updater\ConfigUpdater.a3x" MD5: C56B5F0201A3B3DE53E561FE76912BFD)
      • cmd.exe (PID: 7684 cmdline: "c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\bfadeeb\deddfcf MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WMIC.exe (PID: 7732 cmdline: wmic ComputerSystem get domain MD5: E2DE6500DE1148C7F6027AD50AC8B891)
  • Autoit3.exe (PID: 8020 cmdline: "C:\ProgramData\bfadeeb\Autoit3.exe" C:\ProgramData\bfadeeb\fhdgaef.a3x MD5: C56B5F0201A3B3DE53E561FE76912BFD)
  • Autoit3.exe (PID: 8092 cmdline: "C:\ProgramData\bfadeeb\Autoit3.exe" C:\ProgramData\bfadeeb\fhdgaef.a3x MD5: C56B5F0201A3B3DE53E561FE76912BFD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DarkGateFirst documented in 2018, DarkGate is a commodity loader with features that include the ability to download and execute files to memory, a Hidden Virtual Network Computing (HVNC) module, keylogging, information-stealing capabilities, and privilege escalation. DarkGate makes use of legitimate AutoIt files and typically runs multiple AutoIt scripts. New versions of DarkGate have been advertised on a Russian language eCrime forum since May 2023.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darkgate
{"C2 url": "154.216.16.83", "check_ram": false, "crypter_rawstub": "Whatsapp", "crypter_dll": "PyKtS5QCVyLlgyPHS4pCp0F19IXDQAsFsMQc", "crypter_au3": 6, "flag_14": true, "crypto_key": 80, "startup_persistence": true, "flag_32": false, "anti_vm": false, "min_disk": false, "flag_18": 100, "anti_analysis": false, "min_ram": false, "flag_19": 4096, "check_disk": false, "flag_21": false, "flag_23": true, "flag_31": false, "flag_25": "rjacline01395", "flag_26": false, "flag_27": "VyUZUiNl", "flag_28": false, "flag_29": 2, "flag_35": false}
SourceRuleDescriptionAuthorStrings
00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
    00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DarkGateYara detected DarkGateJoe Security
      0000000A.00000002.2042583535.0000000003F48000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_DarkGateYara detected DarkGateJoe Security
        00000002.00000002.4180519040.00000000048D8000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_DarkGateYara detected DarkGateJoe Security
          00000002.00000003.1834283511.0000000005320000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
            Click to see the 26 entries
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\bfadeeb\Autoit3.exe" C:\ProgramData\bfadeeb\fhdgaef.a3x, EventID: 13, EventType: SetValue, Image: C:\ProgramData\Updater\UpdaterService.exe, ProcessId: 7636, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\deafbbd
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000009.00000002.1966226527.0000000003EC0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: DarkGate {"C2 url": "154.216.16.83", "check_ram": false, "crypter_rawstub": "Whatsapp", "crypter_dll": "PyKtS5QCVyLlgyPHS4pCp0F19IXDQAsFsMQc", "crypter_au3": 6, "flag_14": true, "crypto_key": 80, "startup_persistence": true, "flag_32": false, "anti_vm": false, "min_disk": false, "flag_18": 100, "anti_analysis": false, "min_ram": false, "flag_19": 4096, "check_disk": false, "flag_21": false, "flag_23": true, "flag_31": false, "flag_25": "rjacline01395", "flag_26": false, "flag_27": "VyUZUiNl", "flag_28": false, "flag_29": 2, "flag_35": false}
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.2% probability

            Compliance

            barindex
            Source: Whatsapp-GUI.exeStatic PE information: certificate valid
            Source: unknownHTTPS traffic detected: 162.125.69.18:443 -> 192.168.2.4:49735 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 162.125.69.15:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: Whatsapp-GUI.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\Work\source\repos\Whatsapp-GUI\Whatsapp-GUI\obj\Debug\Whatsapp-GUI.pdb source: Whatsapp-GUI.exe
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,9_2_008A4005
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,9_2_008AC2FF
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A494A GetFileAttributesW,FindFirstFileW,FindClose,9_2_008A494A
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008ACD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,9_2_008ACD9F
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008ACD14 FindFirstFileW,FindClose,9_2_008ACD14
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_008AF5D8
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_008AF735
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,9_2_008AFA36
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,9_2_008A3CE2
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F1DB65 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,9_2_00F1DB65
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BBA584 FindFirstFileW,lstrcmpW,lstrcmpW,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FindNextFileW,FindClose,9_2_03BBA584
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B68AFC FindFirstFileA,GetLastError,9_2_03B68AFC
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B689F4 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,9_2_03B689F4
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB31F8 FindFirstFileW,FindNextFileW,FindClose,9_2_03BB31F8
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BBBA70 FindFirstFileW,FindNextFileW,FindClose,9_2_03BBBA70
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B65974 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,9_2_03B65974
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B7BD8C FindFirstFileA,FindNextFileA,FindClose,9_2_03B7BD8C
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B93D68 FindFirstFileW,FindNextFileW,FindClose,9_2_03B93D68

            Networking

            barindex
            Source: Malware configuration extractorIPs: 154.216.16.83
            Source: global trafficHTTP traffic detected: GET /scl/fi/puclhgu65e9r37o3vcp9m/yutighh.zip?rlkey=csgz30n1xx1twdk9ue4m4p16s&st=nll27ti7&dl=1 HTTP/1.1Host: www.dropbox.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cd/0/get/CgSMY3b56y38dKz7xmmwct_VeYaRtcuJOWChtI4oI_IO-iZv269CfxhkilF-WtkOCcdh8c7d93PYDN0k0DcKMvPxLoKphjBoA3rflRmA4QtzBFtmlD_AJp1UAF2wu1bF6co5hky9EnI2u1tSqJuIGcJf/file?dl=1 HTTP/1.1Host: uc3c2088de79bd8ea4195a51c266.dl.dropboxusercontent.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 162.125.69.18 162.125.69.18
            Source: Joe Sandbox ViewIP Address: 162.125.69.15 162.125.69.15
            Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: unknownTCP traffic detected without corresponding DNS query: 154.216.16.83
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008B29BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,9_2_008B29BA
            Source: global trafficHTTP traffic detected: GET /scl/fi/puclhgu65e9r37o3vcp9m/yutighh.zip?rlkey=csgz30n1xx1twdk9ue4m4p16s&st=nll27ti7&dl=1 HTTP/1.1Host: www.dropbox.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /cd/0/get/CgSMY3b56y38dKz7xmmwct_VeYaRtcuJOWChtI4oI_IO-iZv269CfxhkilF-WtkOCcdh8c7d93PYDN0k0DcKMvPxLoKphjBoA3rflRmA4QtzBFtmlD_AJp1UAF2wu1bF6co5hky9EnI2u1tSqJuIGcJf/file?dl=1 HTTP/1.1Host: uc3c2088de79bd8ea4195a51c266.dl.dropboxusercontent.comConnection: Keep-Alive
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Y44NPolicy: font-src https://* data: ; base-uri 'self' ; media-src https://* blob: ; img-src https://* data: blob: ; form-action https://docs.google.com/document/fsip/ https://docs.google.com/spreadsheets/fsip/ https://docs.google.com/presentation/fsip/ https://docs.sandbox.google.com/document/fsip/ https://docs.sandbox.google.com/spreadsheets/fsip/ https://docs.sandbox.google.com/presentation/fsip/ https://*.purple.officeapps.live-int.com https://officeapps-df.live.com https://*.officeapps-df.live.com https://officeapps.live.com https://*.officeapps.live.com https://paper.dropbox.com/cloud-docs/edit 'self' https://www.dropbox.com/ https://dl-web.dropbox.com/ https://photos.dropbox.com/ https://paper.dropbox.com/ https://showcase.dropbox.com/ https://www.hellofax.com/ https://app.hellofax.com/ https://www.hellosign.com/ https://app.hellosign.com/ https://docsend.com/ https://www.docsend.com/ https://help.dropbox.com/ https://navi.dropbox.jp/ https://a.sprig.com/ https://selfguidedlearning.dropboxbusiness.com/ https://instructorledlearning.dropboxbusiness.com/ https://sales.dropboxbusiness.com/ https://accounts.google.com/ https://api.login.yahoo.com/ https://login.yahoo.com/ https://experience.dropbox.com/ https://pal-test.adyen.com https://2e83413d8036243b-Dropbox-pal-live.adyenpayments.com/ https://onedrive.live.com/picker ; frame-ancestors 'self' https://*.dropbox.com ; report-uri https://www.dropbox.com/csp_log?policy_name=metaserver-whitelist ; default-src https://www.dropbox.com/playlist/ https://www.dropbox.com/v/s/playlist/ https://*.dropboxusercontent.com/p/hls_master_playlist/ https://*.dropboxusercontent.com/p/hls_playlist/ ; script-src 'unsafe-eval' 'inline-speculation-rules' https://www.dropbox.com/static/api/ https://www.dropbox.com/pithos/* https://www.dropbox.com/page_success/ https://cfl.dropboxstatic.com/static/ https://www.dropboxstatic.com/static/ https://accounts.google.com/gsi/client https://canny.io/sdk.js https://www.paypal.com/sdk/js https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ 'unsafe-inline' ; object-src 'self' https://cfl.dropboxstatic.com/static/ https://www.dropboxstatic.com/static/ ; child-src https://www.dropbox.com/static/serviceworker/ blob: ; frame-src https://* carousel: dbapi-6: dbapi-7: dbapi-8: dropbox-client: itms-apps: itms-appss: ; connect-src https://* ws://127.0.0.1:*/ws blob: wss://dsimports.dropbox.com/ ; worker-src https://www.dropbox.com/static/serviceworker/ https://www.dropbox.com/encrypted_folder_download/service_worker.js https://www.dropbox.com/service_worker.js blob: ; style-src https://* 'unsafe-inline' 'unsafe-eval' equals www.yahoo.com (Yahoo)
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: font-src https://* data: ; base-uri 'self' ; media-src https://* blob: ; img-src https://* data: blob: ; form-action https://docs.google.com/document/fsip/ https://docs.google.com/spreadsheets/fsip/ https://docs.google.com/presentation/fsip/ https://docs.sandbox.google.com/document/fsip/ https://docs.sandbox.google.com/spreadsheets/fsip/ https://docs.sandbox.google.com/presentation/fsip/ https://*.purple.officeapps.live-int.com https://officeapps-df.live.com https://*.officeapps-df.live.com https://officeapps.live.com https://*.officeapps.live.com https://paper.dropbox.com/cloud-docs/edit 'self' https://www.dropbox.com/ https://dl-web.dropbox.com/ https://photos.dropbox.com/ https://paper.dropbox.com/ https://showcase.dropbox.com/ https://www.hellofax.com/ https://app.hellofax.com/ https://www.hellosign.com/ https://app.hellosign.com/ https://docsend.com/ https://www.docsend.com/ https://help.dropbox.com/ https://navi.dropbox.jp/ https://a.sprig.com/ https://selfguidedlearning.dropboxbusiness.com/ https://instructorledlearning.dropboxbusiness.com/ https://sales.dropboxbusiness.com/ https://accounts.google.com/ https://api.login.yahoo.com/ https://login.yahoo.com/ https://experience.dropbox.com/ https://pal-test.adyen.com https://2e83413d8036243b-Dropbox-pal-live.adyenpayments.com/ https://onedrive.live.com/picker ; frame-ancestors 'self' https://*.dropbox.com ; report-uri https://www.dropbox.com/csp_log?policy_name=metaserver-whitelist ; default-src https://www.dropbox.com/playlist/ https://www.dropbox.com/v/s/playlist/ https://*.dropboxusercontent.com/p/hls_master_playlist/ https://*.dropboxusercontent.com/p/hls_playlist/ ; script-src 'unsafe-eval' 'inline-speculation-rules' https://www.dropbox.com/static/api/ https://www.dropbox.com/pithos/* https://www.dropbox.com/page_success/ https://cfl.dropboxstatic.com/static/ https://www.dropboxstatic.com/static/ https://accounts.google.com/gsi/client https://canny.io/sdk.js https://www.paypal.com/sdk/js https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ 'unsafe-inline' ; object-src 'self' https://cfl.dropboxstatic.com/static/ https://www.dropboxstatic.com/static/ ; child-src https://www.dropbox.com/static/serviceworker/ blob: ; frame-src https://* carousel: dbapi-6: dbapi-7: dbapi-8: dropbox-client: itms-apps: itms-appss: ; connect-src https://* ws://127.0.0.1:*/ws blob: wss://dsimports.dropbox.com/ ; worker-src https://www.dropbox.com/static/serviceworker/ https://www.dropbox.com/encrypted_folder_download/service_worker.js https://www.dropbox.com/service_worker.js blob: ; style-src https://* 'unsafe-inline' 'unsafe-eval' equals www.yahoo.com (Yahoo)
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: uri 'self' ; media-src https://* blob: ; img-src https://* data: blob: ; form-action https://docs.google.com/document/fsip/ https://docs.google.com/spreadsheets/fsip/ https://docs.google.com/presentation/fsip/ https://docs.sandbox.google.com/document/fsip/ https://docs.sandbox.google.com/spreadsheets/fsip/ https://docs.sandbox.google.com/presentation/fsip/ https://*.purple.officeapps.live-int.com https://officeapps-df.live.com https://*.officeapps-df.live.com https://officeapps.live.com https://*.officeapps.live.com https://paper.dropbox.com/cloud-docs/edit 'self' https://www.dropbox.com/ https://dl-web.dropbox.com/ https://photos.dropbox.com/ https://paper.dropbox.com/ https://showcase.dropbox.com/ https://www.hellofax.com/ https://app.hellofax.com/ https://www.hellosign.com/ https://app.hellosign.com/ https://docsend.com/ https://www.docsend.com/ https://help.dropbox.com/ https://navi.dropbox.jp/ https://a.sprig.com/ https://selfguidedlearning.dropboxbusiness.com/ https://instructorledlearning.dropboxbusiness.com/ https://sales.dropboxbusiness.com/ https://accounts.google.com/ https://api.login.yahoo.com/ https://login.yahoo.com/ https://experience.dropbox.com/ https://pal-test.adyen.com https://2e83413d8036243b-Dropbox-pal-live.adyenpayments.com/ https://onedrive.live.com/picker ; frame-ancestors 'self' https://*.dropbox.com ; report-uri https://www.dropbox.com/csp_log?policy_name=metaserver-whitelist ; default-src https://www.dropbox.com/playlist/ https://www.dropbox.com/v/s/playlist/ https://*.dropboxusercontent.com/p/hls_master_playlist/ https://*.dropboxusercontent.com/p/hls_playlist/ ; script-src 'unsafe-eval' 'inline-speculation-rules' https://www.dropbox.com/static/api/ https://www.dropbox.com/pithos/* https://www.dropbox.com/page_success/ https://cfl.dropboxstatic.com/static/ https://www.dropboxstatic.com/static/ https://accounts.google.com/gsi/client https://canny.io/sdk.js https://www.paypal.com/sdk/js https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ 'unsafe-inline' ; object-src 'self' https://cfl.dropboxstatic.com/static/ https://www.dropboxstatic.com/static/ ; child-src https://www.dropbox.com/static/serviceworker/ blob: ; frame-src https://* carousel: dbapi-6: dbapi-7: dbapi-8: dropbox-client: itms-apps: itms-appss: ; connect-src https://* ws://127.0.0.1:*/ws blob: wss://dsimports.dropbox.com/ ; worker-src https://www.dropbox.com/static/serviceworker/ https://www.dropbox.com/encrypted_folder_download/service_worker.js https://www.dropbox.com/service_worker.js blob: ; style-src https://* 'unsafe-inline' 'unsafe-eval' equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: www.dropbox.com
            Source: global trafficDNS traffic detected: DNS query: uc3c2088de79bd8ea4195a51c266.dl.dropboxusercontent.com
            Source: Whatsapp-GUI.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
            Source: Whatsapp-GUI.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
            Source: Whatsapp-GUI.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0&
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
            Source: Whatsapp-GUI.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002BAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edge-block-www-env.dropbox-dns.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002BAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://edge-block-www-env.dropbox-dns.comd
            Source: UpdaterService.exe, UpdaterService.exe, 00000002.00000003.1833815328.0000000005688000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834283511.0000000005320000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180519040.0000000004871000.00000040.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4183663536.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180372722.0000000004770000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4179218792.00000000046B4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, Autoit3.exe, 00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1965977037.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1966048662.0000000003B61000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2042458426.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2042117134.0000000003D24000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2042583535.0000000003EE1000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://ipinfo.io/ip
            Source: UpdaterService.exe, 00000002.00000003.1833815328.0000000005688000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834283511.0000000005320000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180519040.0000000004871000.00000040.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4183663536.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180372722.0000000004770000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4179218792.00000000046B4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1965977037.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1966048662.0000000003B61000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2042458426.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2042117134.0000000003D24000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2042583535.0000000003EE1000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://ipinfo.io/ipU
            Source: Whatsapp-GUI.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
            Source: Whatsapp-GUI.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
            Source: Whatsapp-GUI.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: Whatsapp-GUI.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Whatsapp-GUI.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
            Source: Whatsapp-GUI.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
            Source: Whatsapp-GUI.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002BAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://uc3c2088de79bd8ea4195a51c266.dl.dropboxusercontent.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002BAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://uc3c2088de79bd8ea4195a51c266.dl.dropboxusercontent.comd
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www-env.dropbox-dns.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www-env.dropbox-dns.comd
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: Whatsapp-GUI.exe, 00000000.00000002.1821852634.0000000008A5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/PW
            Source: UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000000.1789844596.00000000000F9000.00000002.00000001.01000000.0000000C.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000000.1935094636.0000000000909000.00000002.00000001.01000000.0000000F.sdmp, Autoit3.exe, 0000000A.00000000.2015835231.0000000000909000.00000002.00000001.01000000.0000000F.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dropbox.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dropbox.comd
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: Whatsapp-GUI.exe, 00000000.00000002.1820861938.0000000006C82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://2e83413d8036243b-Dropbox-pal-live.adyenpayments.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://a.sprig.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/gsi/client
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.login.yahoo.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.hellofax.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.hellosign.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://canny.io/sdk.js
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cfl.dropboxstatic.com/static/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dl-web.dropbox.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/document/fsip/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/presentation/fsip/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.google.com/spreadsheets/fsip/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.sandbox.google.com/document/fsip/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.sandbox.google.com/presentation/fsip/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.sandbox.google.com/spreadsheets/fsip/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docsend.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://experience.dropbox.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://help.dropbox.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://instructorledlearning.dropboxbusiness.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.yahoo.com/
            Source: Autoit3.exe, 0000000A.00000002.2042583535.0000000003EE1000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/u/0/#inbox
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://navi.dropbox.jp/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://officeapps-df.live.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://officeapps.live.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/picker
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pal-test.adyen.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paper.dropbox.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paper.dropbox.com/cloud-docs/edit
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://photos.dropbox.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sales.dropboxbusiness.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://selfguidedlearning.dropboxbusiness.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://showcase.dropbox.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uc3c2088de79bd8ea4195a51c266.dl.dropboxusercontent.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uc3c2088de79bd8ea4195a51c266.dl.dropboxusercontent.com/cd/0/get/CgSMY3b56y38dKz7xmmwct_VeYaR
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: https://www.autoitscript.com/autoit3/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.docsend.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B3E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/csp_log?policy_name=metaserver-whitelist
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/encrypted_folder_download/service_worker.js
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/page_success/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/pithos/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/playlist/
            Source: Whatsapp-GUI.exeString found in binary or memory: https://www.dropbox.com/scl/fi/puclhgu65e9r37o3vcp9m/yutighh.zip?rlkey=csgz30n1xx1twdk9ue4m4p16s&st=
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/service_worker.js
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/static/api/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/static/serviceworker/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/v/s/playlist/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.dropboxstatic.com/static/
            Source: Autoit3.exe.2.drString found in binary or memory: https://www.globalsign.com/repository/0
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002C2C000.00000004.00000800.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005091000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834387341.0000000004FB6000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1831730569.0000000005093000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe.0.dr, Autoit3.exe.2.drString found in binary or memory: https://www.globalsign.com/repository/06
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.hellofax.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.hellosign.com/
            Source: Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B8A000.00000004.00000800.00020000.00000000.sdmp, Whatsapp-GUI.exe, 00000000.00000002.1817740584.0000000002B5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.paypal.com/sdk/js
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownHTTPS traffic detected: 162.125.69.18:443 -> 192.168.2.4:49735 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 162.125.69.15:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008B4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,9_2_008B4632
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008B4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,9_2_008B4830
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008B4632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,9_2_008B4632
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B9B188 GetObjectA,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,9_2_03B9B188
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A0508 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,9_2_008A0508
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeCode function: 0_2_0765B930 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_0765B930
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008CD164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,9_2_008CD164
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB2170 OpenDesktopA,CreateDesktopA,SetThreadDesktop,CreateProcessA,9_2_03BB2170
            Source: C:\ProgramData\Updater\UpdaterService.exeProcess Stats: CPU usage > 49%
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB43EC NtDuplicateObject,NtClose,9_2_03BB43EC
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB476C Sleep,TerminateThread,NtClose,NtClose,9_2_03BB476C
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB44C8 NtQuerySystemInformation,NtDuplicateObject,NtClose,NtClose,NtClose,NtClose,NtClose,NtClose,NtClose,9_2_03BB44C8
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB4420 NtQueryObject,NtQueryObject,9_2_03BB4420
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB4478 NtOpenProcess,9_2_03BB4478
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B8AF84 GetCurrentProcessId,OpenProcess,InitializeProcThreadAttributeList,GetProcessHeap,RtlAllocateHeap,InitializeProcThreadAttributeList,UpdateProcThreadAttribute,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,9_2_03B8AF84
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B92CF0 BeginPaint,SetBkMode,TextOutA,EndPaint,PostQuitMessage,NtdllDefWindowProc_A,9_2_03B92CF0
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B8B2A4 GetCurrentProcessId,CreateProcessA,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,ResumeThread,Sleep,GetTickCount,9_2_03B8B2A4
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A42D5: CreateFileW,DeviceIoControl,CloseHandle,9_2_008A42D5
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00898F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,9_2_00898F2E
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,9_2_008A5778
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeCode function: 0_2_0116D55C0_2_0116D55C
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeCode function: 0_2_0765075B0_2_0765075B
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeCode function: 0_2_076558C00_2_076558C0
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F734BA2_3_04F734BA
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F734BA2_3_04F734BA
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F2B43F2_3_04F2B43F
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F2B43F2_3_04F2B43F
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F206252_3_04F20625
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F206252_3_04F20625
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F1F7D12_3_04F1F7D1
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F1F7D12_3_04F1F7D1
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F250DE2_3_04F250DE
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F250DE2_3_04F250DE
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F141342_3_04F14134
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F141342_3_04F14134
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F1A3432_3_04F1A343
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F1A3432_3_04F1A343
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F5B8C42_3_04F5B8C4
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F5B8C42_3_04F5B8C4
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F518322_3_04F51832
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F518322_3_04F51832
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F29A662_3_04F29A66
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F29A662_3_04F29A66
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F1EA562_3_04F1EA56
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F1EA562_3_04F1EA56
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0084B0209_2_0084B020
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008416639_2_00841663
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00849C809_2_00849C80
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008623F59_2_008623F5
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008C84009_2_008C8400
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008765029_2_00876502
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0084E6F09_2_0084E6F0
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0087265E9_2_0087265E
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086282A9_2_0086282A
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008789BF9_2_008789BF
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008C0A3A9_2_008C0A3A
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00876A749_2_00876A74
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00850BE09_2_00850BE0
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0089EDB29_2_0089EDB2
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086CD519_2_0086CD51
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008C0EB79_2_008C0EB7
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A8E449_2_008A8E44
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00876FE69_2_00876FE6
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008633B79_2_008633B7
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008494E09_2_008494E0
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086F4099_2_0086F409
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0085D45D9_2_0085D45D
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0084F6A09_2_0084F6A0
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008616B49_2_008616B4
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0085F6289_2_0085F628
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008678C39_2_008678C3
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086DBA59_2_0086DBA5
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00861BA89_2_00861BA8
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00879CE59_2_00879CE5
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0085DD289_2_0085DD28
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00861FC09_2_00861FC0
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086BFD69_2_0086BFD6
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B8A79C9_2_03B8A79C
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B864389_2_03B86438
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B9EC009_2_03B9EC00
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BAB1B89_2_03BAB1B8
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BA9BD09_2_03BA9BD0
            Source: Joe Sandbox ViewDropped File: C:\ProgramData\Updater\UpdaterService.exe (copy) 237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: String function: 04F1B5B0 appears 59 times
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: String function: 04F1CA25 appears 36 times
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: String function: 04F245F0 appears 46 times
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: String function: 03B64394 appears 101 times
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: String function: 03B921B8 appears 36 times
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: String function: 00868B30 appears 42 times
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: String function: 00851A36 appears 34 times
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: String function: 00860D17 appears 70 times
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: String function: 03B66980 appears 111 times
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: String function: 03B64668 appears 48 times
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: String function: 03B64904 appears 92 times
            Source: Whatsapp-GUI.exe, 00000000.00000002.1816344898.0000000000C7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Whatsapp-GUI.exe
            Source: classification engineClassification label: mal69.troj.spyw.evad.winEXE@10/12@2/3
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AA6AD GetLastError,FormatMessageW,9_2_008AA6AD
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00898DE9 AdjustTokenPrivileges,CloseHandle,9_2_00898DE9
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00899399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,9_2_00899399
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AB976 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,9_2_008AB976
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A4148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,9_2_008A4148
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AC9DA CoInitialize,CoCreateInstance,CoUninitialize,9_2_008AC9DA
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,9_2_008A443D
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Whatsapp-GUI.exe.logJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7692:120:WilError_03
            Source: C:\ProgramData\Updater\UpdaterService.exeFile created: C:\temp\Jump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCommand line argument: 0k9_2_00855F8B
            Source: Whatsapp-GUI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\ProgramData\Updater\UpdaterService.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: Whatsapp-GUI.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Whatsapp-GUI.exe "C:\Users\user\Desktop\Whatsapp-GUI.exe"
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess created: C:\ProgramData\Updater\UpdaterService.exe "C:\ProgramData\Updater\UpdaterService.exe" "C:\ProgramData\Updater\ConfigUpdater.a3x"
            Source: C:\ProgramData\Updater\UpdaterService.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\bfadeeb\deddfcf
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic ComputerSystem get domain
            Source: unknownProcess created: C:\ProgramData\bfadeeb\Autoit3.exe "C:\ProgramData\bfadeeb\Autoit3.exe" C:\ProgramData\bfadeeb\fhdgaef.a3x
            Source: unknownProcess created: C:\ProgramData\bfadeeb\Autoit3.exe "C:\ProgramData\bfadeeb\Autoit3.exe" C:\ProgramData\bfadeeb\fhdgaef.a3x
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess created: C:\ProgramData\Updater\UpdaterService.exe "C:\ProgramData\Updater\UpdaterService.exe" "C:\ProgramData\Updater\ConfigUpdater.a3x"Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\bfadeeb\deddfcfJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic ComputerSystem get domainJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: version.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: mpr.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: userenv.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: netutils.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: version.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: mpr.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: userenv.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: netutils.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: version.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: winmm.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: mpr.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: wininet.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: userenv.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: netutils.dllJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: Whatsapp-GUI.exeStatic PE information: certificate valid
            Source: Whatsapp-GUI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Whatsapp-GUI.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Whatsapp-GUI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: C:\Users\Work\source\repos\Whatsapp-GUI\Whatsapp-GUI\obj\Debug\Whatsapp-GUI.pdb source: Whatsapp-GUI.exe
            Source: Whatsapp-GUI.exeStatic PE information: 0x8CE2628A [Fri Nov 25 00:30:02 2044 UTC]
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008BC6D9 LoadLibraryA,GetProcAddress,9_2_008BC6D9
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeCode function: 0_2_09E0399D push FFFFFF8Bh; iretd 0_2_09E0399F
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F1B5F5 push ecx; ret 2_3_04F1B608
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F1B5F5 push ecx; ret 2_3_04F1B608
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04EF770A push esi; ret 2_3_04EF770D
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04EF770A push esi; ret 2_3_04EF770D
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086E93F push edi; ret 9_2_0086E941
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A8A4A push FFFFFF8Bh; iretd 9_2_008A8A4C
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086EA58 push esi; ret 9_2_0086EA5A
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00868B75 push ecx; ret 9_2_00868B88
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086EC33 push esi; ret 9_2_0086EC35
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086ED1C push edi; ret 9_2_0086ED1E
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F1E1C1 push 00F1E212h; ret 9_2_00F1E20A
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F1C225 push eax; ret 9_2_00F1C261
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F223A9 push 00F223CFh; ret 9_2_00F223C7
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F1F4C1 push ecx; mov dword ptr [esp], eax9_2_00F1F4C2
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F1E441 push 00F1E46Dh; ret 9_2_00F1E465
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F1E409 push 00F1E435h; ret 9_2_00F1E42D
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F1E58A push 00F1E835h; ret 9_2_00F1E82D
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F1E551 push 00F1E57Dh; ret 9_2_00F1E575
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F1E809 push 00F1E835h; ret 9_2_00F1E82D
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F21ABD push 00F21C39h; ret 9_2_00F21C31
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F21C3B push 00F21CACh; ret 9_2_00F21CA4
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F21C3D push 00F21CACh; ret 9_2_00F21CA4
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F2AEBC pushad ; ret 9_2_00F2AEF9
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB83A0 push 03BB83CCh; ret 9_2_03BB83C4
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB43A4 push 03BB43D0h; ret 9_2_03BB43C8
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B7C380 push 03B7C3B4h; ret 9_2_03B7C3AC
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B7C388 push 03B7C3B4h; ret 9_2_03B7C3AC
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB83D8 push 03BB8404h; ret 9_2_03BB83FC
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB8330 push 03BB835Ch; ret 9_2_03BB8354
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB8368 push 03BB8394h; ret 9_2_03BB838C
            Source: C:\ProgramData\Updater\UpdaterService.exeFile created: C:\ProgramData\bfadeeb\Autoit3.exeJump to dropped file
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeFile created: C:\ProgramData\Updater\UpdaterService.exe (copy)Jump to dropped file
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeFile created: C:\ProgramData\Updater\Autoit3.exeJump to dropped file
            Source: C:\ProgramData\Updater\UpdaterService.exeFile created: C:\ProgramData\bfadeeb\Autoit3.exeJump to dropped file
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeFile created: C:\ProgramData\Updater\UpdaterService.exe (copy)Jump to dropped file
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeFile created: C:\ProgramData\Updater\Autoit3.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\ProgramData\Updater\UpdaterService.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run deafbbdJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run deafbbdJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run deafbbdJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008C59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,9_2_008C59B3
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00855EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,9_2_00855EDA
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008633B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,9_2_008633B7
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BBC8289_2_03BBC828
            Source: UpdaterService.exe, UpdaterService.exe, 00000002.00000003.1833815328.0000000005688000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834283511.0000000005320000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180519040.0000000004871000.00000040.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4183663536.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180372722.0000000004770000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4179218792.00000000046B4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, Autoit3.exe, 00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1965977037.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1966048662.0000000003B61000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2042458426.0000000003DE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SUPERANTISPYWARE.EXE
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeMemory allocated: 1160000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeMemory allocated: 2AA0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeMemory allocated: 4AA0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeThread delayed: delay time: 1800000Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeWindow / User API: threadDelayed 2383Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeWindow / User API: threadDelayed 7448Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeWindow / User API: threadDelayed 1914Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeWindow / User API: threadDelayed 1127Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeWindow / User API: foregroundWindowGot 1390Jump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeAPI coverage: 4.9 %
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BBC8289_2_03BBC828
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -29514790517935264s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -100000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -99857s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -99748s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -99639s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -99529s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -99421s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -99307s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -99202s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -99079s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -98922s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -98809s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -98703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -98593s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -98484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -98375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -98265s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -98156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -98047s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -97937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -97828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -97718s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -97609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -97499s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -97390s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -97281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -97171s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -97062s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -96953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -96843s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -96734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -96624s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -96515s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -96395s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -96265s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -96062s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -95930s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -95812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -95703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -95593s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -95484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -95375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -95265s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -95155s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -95047s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -94937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -94826s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -94718s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -94609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -94500s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exe TID: 7424Thread sleep time: -94390s >= -30000sJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exe TID: 7780Thread sleep time: -454500s >= -30000sJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exe TID: 7796Thread sleep time: -9000000s >= -30000sJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exe TID: 7780Thread sleep time: -1690500s >= -30000sJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exe TID: 7792Thread sleep time: -121000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Domain FROM Win32_ComputerSystem
            Source: C:\ProgramData\bfadeeb\Autoit3.exeLast function: Thread delayed
            Source: C:\ProgramData\bfadeeb\Autoit3.exeLast function: Thread delayed
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,9_2_008A4005
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,9_2_008AC2FF
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A494A GetFileAttributesW,FindFirstFileW,FindClose,9_2_008A494A
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008ACD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,9_2_008ACD9F
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008ACD14 FindFirstFileW,FindClose,9_2_008ACD14
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_008AF5D8
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,9_2_008AF735
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008AFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,9_2_008AFA36
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,9_2_008A3CE2
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F1DB65 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,9_2_00F1DB65
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BBA584 FindFirstFileW,lstrcmpW,lstrcmpW,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FindNextFileW,FindClose,9_2_03BBA584
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B68AFC FindFirstFileA,GetLastError,9_2_03B68AFC
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B689F4 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,9_2_03B689F4
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BB31F8 FindFirstFileW,FindNextFileW,FindClose,9_2_03BB31F8
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03BBBA70 FindFirstFileW,FindNextFileW,FindClose,9_2_03BBBA70
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B65974 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,9_2_03B65974
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B7BD8C FindFirstFileA,FindNextFileA,FindClose,9_2_03B7BD8C
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B93D68 FindFirstFileW,FindNextFileW,FindClose,9_2_03B93D68
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00855D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,9_2_00855D13
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 99857Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 99748Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 99639Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 99529Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 99421Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 99307Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 99202Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 99079Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 98922Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 98809Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 98703Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 98593Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 98484Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 98375Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 98265Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 98156Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 98047Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 97937Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 97828Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 97718Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 97609Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 97499Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 97390Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 97281Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 97171Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 97062Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 96953Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 96843Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 96734Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 96624Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 96515Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 96395Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 96265Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 96062Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 95930Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 95812Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 95703Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 95593Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 95484Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 95375Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 95265Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 95155Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 95047Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 94937Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 94826Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 94718Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 94609Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 94500Jump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeThread delayed: delay time: 94390Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeThread delayed: delay time: 1800000Jump to behavior
            Source: Whatsapp-GUI.exe, 00000000.00000002.1821852634.0000000008A48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}V
            Source: Autoit3.exe, 0000000A.00000002.2042583535.0000000003EE1000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: vmware
            Source: UpdaterService.exe, UpdaterService.exe, 00000002.00000003.1833815328.0000000005688000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834283511.0000000005320000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180519040.0000000004871000.00000040.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4183663536.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180372722.0000000004770000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4179218792.00000000046B4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, Autoit3.exe, 00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1965977037.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1966048662.0000000003B61000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2042458426.0000000003DE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: microsoft hyper-v video
            Source: Whatsapp-GUI.exe, 00000000.00000002.1816344898.0000000000CB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
            Source: Whatsapp-GUI.exe, 00000000.00000002.1821852634.00000000089A0000.00000004.00000020.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4176245348.00000000019CA000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1964958277.0000000000F32000.00000004.00000020.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2041037254.0000000000EFA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\ProgramData\Updater\UpdaterService.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008B45D5 BlockInput,9_2_008B45D5
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00855240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,9_2_00855240
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00875CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,9_2_00875CAC
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008BC6D9 LoadLibraryA,GetProcAddress,9_2_008BC6D9
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00F2A766 mov eax, dword ptr fs:[00000030h]9_2_00F2A766
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B880A4 mov eax, dword ptr fs:[00000030h]9_2_03B880A4
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B8A79C mov eax, dword ptr fs:[00000030h]9_2_03B8A79C
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B8A79C mov eax, dword ptr fs:[00000030h]9_2_03B8A79C
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008988CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,9_2_008988CD
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess token adjusted: DebugJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0086A385
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0086A354 SetUnhandledExceptionFilter,9_2_0086A354
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B8DCB8 CreateProcessA,CreateProcessA,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,9_2_03B8DCB8
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B8DCB8 CreateProcessA,CreateProcessA,OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,CloseHandle,9_2_03B8DCB8
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00899369 LogonUserW,9_2_00899369
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00855240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,9_2_00855240
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A1AC6 SendInput,keybd_event,9_2_008A1AC6
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A51E2 mouse_event,9_2_008A51E2
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeProcess created: C:\ProgramData\Updater\UpdaterService.exe "C:\ProgramData\Updater\UpdaterService.exe" "C:\ProgramData\Updater\ConfigUpdater.a3x"Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\bfadeeb\deddfcfJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic ComputerSystem get domainJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008988CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,9_2_008988CD
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008A4F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,9_2_008A4F1C
            Source: UpdaterService.exe, 00000002.00000000.1789777520.00000000000E6000.00000002.00000001.01000000.0000000C.sdmp, UpdaterService.exe, 00000002.00000003.1832205253.0000000005083000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834752096.0000000004FA8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: UpdaterService.exe, 00000002.00000002.4182845789.0000000004EF0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: program manager&
            Source: UpdaterService.exe, 00000002.00000002.4182845789.0000000004EF0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: UpdaterService.exe, 00000002.00000002.4176245348.00000000019CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managertem32
            Source: UpdaterService.exe, Autoit3.exeBinary or memory string: Shell_TrayWnd
            Source: UpdaterService.exe, 00000002.00000002.4176245348.00000000019CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagertonT
            Source: UpdaterService.exe, 00000002.00000002.4176245348.00000000019CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerATAT
            Source: UpdaterService.exe, 00000002.00000002.4182845789.0000000004EF0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: program manager
            Source: UpdaterService.exe, 00000002.00000002.4176245348.00000000019CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerInfo
            Source: C:\ProgramData\Updater\UpdaterService.exeCode function: 2_3_04F1B2DB cpuid 2_3_04F1B2DB
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,9_2_00F1DD3D
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: GetLocaleInfoA,9_2_00F20021
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: GetLocaleInfoA,GetACP,9_2_00F21179
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: GetLocaleInfoA,9_2_00F1E14D
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,9_2_00F1DE47
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: GetLocaleInfoA,9_2_00F1FFD5
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,9_2_03B65B4C
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: GetLocaleInfoA,9_2_03B66470
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: GetLocaleInfoA,GetACP,9_2_03B6CC88
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: GetLocaleInfoA,9_2_03B6B620
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: GetLocaleInfoA,9_2_03B6B66C
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,9_2_03B65C56
            Source: C:\ProgramData\Updater\UpdaterService.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\ProgramData\Updater\UpdaterService.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIDJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Users\user\Desktop\Whatsapp-GUI.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00880030 GetLocalTime,__swprintf,9_2_00880030
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00880722 GetUserNameW,9_2_00880722
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_0087416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,9_2_0087416A
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_00855D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,9_2_00855D13
            Source: C:\Users\user\Desktop\Whatsapp-GUI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: UpdaterService.exe, UpdaterService.exe, 00000002.00000003.1833815328.0000000005688000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834283511.0000000005320000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180519040.0000000004871000.00000040.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4183663536.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180372722.0000000004770000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4179218792.00000000046B4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, Autoit3.exe, 00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1965977037.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1966048662.0000000003B61000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2042458426.0000000003DE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: mcshield.exe
            Source: UpdaterService.exe, UpdaterService.exe, 00000002.00000003.1833815328.0000000005688000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000003.1834283511.0000000005320000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180519040.0000000004871000.00000040.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4183663536.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4180372722.0000000004770000.00000004.00001000.00020000.00000000.sdmp, UpdaterService.exe, 00000002.00000002.4179218792.00000000046B4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, Autoit3.exe, 00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1965977037.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, Autoit3.exe, 00000009.00000002.1966048662.0000000003B61000.00000040.00001000.00020000.00000000.sdmp, Autoit3.exe, 0000000A.00000002.2042458426.0000000003DE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: superantispyware.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2042583535.0000000003F48000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4180519040.00000000048D8000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000003.1834283511.0000000005320000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1966048662.0000000003BC8000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000003.1833815328.0000000005688000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2042458426.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000003.1834927328.0000000005380000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4183663536.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1965977037.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2042117134.0000000003D24000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4179218792.00000000046B4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4180372722.0000000004770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: UpdaterService.exe PID: 7636, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 8020, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 8092, type: MEMORYSTR
            Source: Yara matchFile source: 00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000003.1834283511.0000000005320000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4180519040.0000000004871000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000003.1833815328.0000000005688000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2042458426.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4183663536.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1965977037.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1966048662.0000000003B61000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2042117134.0000000003D24000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2042583535.0000000003EE1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4179218792.00000000046B4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4180372722.0000000004770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: UpdaterService.exe PID: 7636, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 8020, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 8092, type: MEMORYSTR
            Source: Autoit3.exeBinary or memory string: WIN_81
            Source: Autoit3.exeBinary or memory string: WIN_XP
            Source: Autoit3.exeBinary or memory string: WIN_XPe
            Source: Autoit3.exeBinary or memory string: WIN_VISTA
            Source: Autoit3.exeBinary or memory string: WIN_7
            Source: Autoit3.exeBinary or memory string: WIN_8
            Source: Autoit3.exe.2.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000009.00000002.1965692690.00000000039A4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2042583535.0000000003F48000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4180519040.00000000048D8000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000003.1834283511.0000000005320000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1966048662.0000000003BC8000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000003.1833815328.0000000005688000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2042458426.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000003.1834927328.0000000005380000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4183663536.00000000056F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.1965977037.0000000003A60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.2042117134.0000000003D24000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4179218792.00000000046B4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4180372722.0000000004770000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: UpdaterService.exe PID: 7636, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 8020, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Autoit3.exe PID: 8092, type: MEMORYSTR
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008B696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,9_2_008B696E
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_008B6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,9_2_008B6E32
            Source: C:\ProgramData\bfadeeb\Autoit3.exeCode function: 9_2_03B7CCB4 bind,9_2_03B7CCB4
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            11
            Disable or Modify Tools
            21
            Input Capture
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            2
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            1
            Create Account
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol1
            Screen Capture
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            Command and Scripting Interpreter
            2
            Valid Accounts
            2
            Valid Accounts
            2
            Obfuscated Files or Information
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares21
            Input Capture
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron11
            Registry Run Keys / Startup Folder
            21
            Access Token Manipulation
            1
            Timestomp
            NTDS66
            System Information Discovery
            Distributed Component Object Model3
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
            Process Injection
            1
            DLL Side-Loading
            LSA Secrets261
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
            Registry Run Keys / Startup Folder
            1
            Masquerading
            Cached Domain Credentials41
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Valid Accounts
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job41
            Virtualization/Sandbox Evasion
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
            Process Injection
            Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1575235 Sample: Whatsapp-GUI.exe Startdate: 14/12/2024 Architecture: WINDOWS Score: 69 35 www.dropbox.com 2->35 37 www-env.dropbox-dns.com 2->37 39 2 other IPs or domains 2->39 47 Found malware configuration 2->47 49 Yara detected DarkGate 2->49 51 Yara detected MailPassView 2->51 53 3 other signatures 2->53 9 Whatsapp-GUI.exe 15 8 2->9         started        13 Autoit3.exe 1 2->13         started        16 Autoit3.exe 2->16         started        signatures3 process4 dnsIp5 43 edge-block-www-env.dropbox-dns.com 162.125.69.15, 443, 49737 DROPBOXUS United States 9->43 45 www-env.dropbox-dns.com 162.125.69.18, 443, 49735 DROPBOXUS United States 9->45 31 C:\ProgramData\...\UpdaterService.exe (copy), PE32 9->31 dropped 33 C:\ProgramData\Updater\Autoit3.exe, PE32 9->33 dropped 18 UpdaterService.exe 1 10 9->18         started        57 Contains functionality to inject threads in other processes 13->57 59 Contains functionality to inject code into remote processes 13->59 61 Contains functionality to detect sleep reduction / modifications 13->61 file6 signatures7 process8 dnsIp9 41 154.216.16.83, 49740, 49741, 49742 SKHT-ASShenzhenKatherineHengTechnologyInformationCo Seychelles 18->41 29 C:\ProgramData\bfadeeb\Autoit3.exe, PE32 18->29 dropped 55 Creates autostart registry keys with suspicious names 18->55 23 cmd.exe 2 18->23         started        file10 signatures11 process12 process13 25 WMIC.exe 1 23->25         started        27 conhost.exe 23->27         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.