Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Bukti_Transfer...pdf.exe

Overview

General Information

Sample name:Bukti_Transfer...pdf.exe
Analysis ID:1616515
MD5:8b0f66978d1934eec07b6213c2c8037a
SHA1:a33a467ae0d0ceaefcefaf7a5b6f7670ec1c3062
SHA256:9c39d381f96fb45ffcb826c90aaee8c6818767eabf44e757fa5518217611d7c7
Tags:exeuser-Bastian455_
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Bukti_Transfer...pdf.exe (PID: 7092 cmdline: "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe" MD5: 8B0F66978D1934EEC07B6213C2C8037A)
    • powershell.exe (PID: 4916 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 1928 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 1448 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Bukti_Transfer...pdf.exe (PID: 2916 cmdline: "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe" MD5: 8B0F66978D1934EEC07B6213C2C8037A)
  • DpEFdRPYuiXBgv.exe (PID: 6884 cmdline: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe MD5: 8B0F66978D1934EEC07B6213C2C8037A)
    • schtasks.exe (PID: 7200 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp2670.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • DpEFdRPYuiXBgv.exe (PID: 7252 cmdline: "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe" MD5: 8B0F66978D1934EEC07B6213C2C8037A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["austin99.duckdns.org:9373:1", "103.186.117.61:9373:1", "heksaa3030.redirectme.net:9373:1"], "Assigned name": "FEB 16", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Rmc-YHG6AC", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.4194398776.000000000281F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000006.00000002.4193882290.0000000000CDD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000006.00000002.4193882290.0000000000D05000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000000.00000002.1769826597.0000000003BAB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000000.00000002.1769826597.0000000003BAB000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x13288:$a1: Remcos restarted by watchdog!
            • 0x137e0:$a3: %02i:%02i:%02i:%03i
            • 0x13b65:$a4: * Remcos v
            Click to see the 23 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpackWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x661e0:$a1: Remcos restarted by watchdog!
              • 0x66738:$a3: %02i:%02i:%02i:%03i
              • 0x66abd:$a4: * Remcos v
              0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpackREMCOS_RAT_variantsunknownunknown
              • 0x611e4:$str_a1: C:\Windows\System32\cmd.exe
              • 0x61160:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x61160:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
              • 0x60610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
              • 0x60e48:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x6020c:$str_b2: Executing file:
              • 0x61328:$str_b3: GetDirectListeningPort
              • 0x60c08:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x60e30:$str_b7: \update.vbs
              • 0x60234:$str_b9: Downloaded file:
              • 0x60220:$str_b10: Downloading file:
              • 0x602c4:$str_b12: Failed to upload file:
              • 0x612f0:$str_b13: StartForward
              • 0x61310:$str_b14: StopForward
              • 0x60dd8:$str_b15: fso.DeleteFile "
              • 0x60d6c:$str_b16: On Error Resume Next
              • 0x60e08:$str_b17: fso.DeleteFolder "
              • 0x602b4:$str_b18: Uploaded file:
              • 0x60274:$str_b19: Unable to delete:
              • 0x60da0:$str_b20: while fso.FileExists("
              • 0x60749:$str_c0: [Firefox StoredLogins not found]
              0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
              • 0x60100:$s1: \Classes\mscfile\shell\open\command
              • 0x60160:$s1: \Classes\mscfile\shell\open\command
              • 0x60148:$s2: eventvwr.exe
              0.2.Bukti_Transfer...pdf.exe.48e9170.1.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                Click to see the 32 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe", CommandLine: "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe, NewProcessName: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe, OriginalFileName: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe", ProcessId: 7092, ProcessName: Bukti_Transfer...pdf.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe", ParentImage: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe, ParentProcessId: 7092, ParentProcessName: Bukti_Transfer...pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe", ProcessId: 4916, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe", ParentImage: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe, ParentProcessId: 7092, ParentProcessName: Bukti_Transfer...pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe", ProcessId: 4916, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp2670.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp2670.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe, ParentImage: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe, ParentProcessId: 6884, ParentProcessName: DpEFdRPYuiXBgv.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp2670.tmp", ProcessId: 7200, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe", ParentImage: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe, ParentProcessId: 7092, ParentProcessName: Bukti_Transfer...pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp", ProcessId: 1448, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe", ParentImage: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe, ParentProcessId: 7092, ParentProcessName: Bukti_Transfer...pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe", ProcessId: 4916, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe", ParentImage: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe, ParentProcessId: 7092, ParentProcessName: Bukti_Transfer...pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp", ProcessId: 1448, ProcessName: schtasks.exe

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe, ProcessId: 2916, TargetFilename: C:\ProgramData\remcos\logs.dat
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-16T23:57:33.884954+010020365941Malware Command and Control Activity Detected192.168.2.449734185.213.83.339373TCP
                2025-02-16T23:57:34.860779+010020365941Malware Command and Control Activity Detected192.168.2.464599103.186.117.619373TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-02-16T23:57:36.772081+010028033043Unknown Traffic192.168.2.464600178.237.33.5080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Bukti_Transfer...pdf.exeAvira: detected
                Source: austin99.duckdns.orgAvira URL Cloud: Label: malware
                Source: heksaa3030.redirectme.netAvira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeAvira: detection malicious, Label: HEUR/AGEN.1323831
                Source: 00000007.00000002.1793107257.0000000004352000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["austin99.duckdns.org:9373:1", "103.186.117.61:9373:1", "heksaa3030.redirectme.net:9373:1"], "Assigned name": "FEB 16", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Rmc-YHG6AC", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"}
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeReversingLabs: Detection: 59%
                Source: Bukti_Transfer...pdf.exeReversingLabs: Detection: 59%
                Source: Bukti_Transfer...pdf.exeVirustotal: Detection: 59%Perma Link
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.4194398776.000000000281F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000CDD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000D05000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769826597.0000000003BAB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1770743205.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000CB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.0000000003FD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.0000000004352000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769826597.0000000004873000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.00000000040D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 7092, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 2916, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 6884, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 7252, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,11_2_004315EC
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1769826597.0000000003BAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_7c2c409c-c
                Source: Bukti_Transfer...pdf.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: Bukti_Transfer...pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,11_2_0041A01B
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,11_2_0040B28E
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_0040838E
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_004087A0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,11_2_00407848
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004068CD FindFirstFileW,FindNextFileW,11_2_004068CD
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040AA71
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00417AAB
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040AC78
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00406D28
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 4x nop then jmp 028CBC28h0_2_028CBF64
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 4x nop then jmp 0723AE80h7_2_0723B1BC

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:64599 -> 103.186.117.61:9373
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49734 -> 185.213.83.33:9373
                Source: Malware configuration extractorURLs: austin99.duckdns.org
                Source: Malware configuration extractorURLs: heksaa3030.redirectme.net
                Source: Malware configuration extractorIPs: 103.186.117.61
                Source: unknownDNS query: name: austin99.duckdns.org
                Source: global trafficTCP traffic: 192.168.2.4:49734 -> 185.213.83.33:9373
                Source: global trafficTCP traffic: 192.168.2.4:64599 -> 103.186.117.61:9373
                Source: global trafficTCP traffic: 192.168.2.4:64598 -> 1.1.1.1:53
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: AARNET-AS-APAustralianAcademicandResearchNetworkAARNe AARNET-AS-APAustralianAcademicandResearchNetworkAARNe
                Source: Joe Sandbox ViewASN Name: QUICKPACKETUS QUICKPACKETUS
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:64600 -> 178.237.33.50:80
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownTCP traffic detected without corresponding DNS query: 103.186.117.61
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0041936B InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,11_2_0041936B
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: global trafficDNS traffic detected: DNS query: austin99.duckdns.org
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000CDD000.00000004.00000020.00020000.00000000.sdmp, Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000D05000.00000004.00000020.00020000.00000000.sdmp, Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000CB7000.00000004.00000020.00020000.00000000.sdmp, DpEFdRPYuiXBgv.exeString found in binary or memory: http://geoplugin.net/json.gp
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1769826597.0000000003BAB000.00000004.00000800.00020000.00000000.sdmp, Bukti_Transfer...pdf.exe, 00000000.00000002.1769826597.0000000004873000.00000004.00000800.00020000.00000000.sdmp, DpEFdRPYuiXBgv.exe, 00000007.00000002.1793107257.0000000004352000.00000004.00000800.00020000.00000000.sdmp, DpEFdRPYuiXBgv.exe, 00000007.00000002.1793107257.00000000040D8000.00000004.00000800.00020000.00000000.sdmp, DpEFdRPYuiXBgv.exe, 00000007.00000002.1793107257.0000000003FD9000.00000004.00000800.00020000.00000000.sdmp, DpEFdRPYuiXBgv.exe, 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000CDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                Source: Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000D05000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpv
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1766457345.0000000000C91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.mic
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1766457345.0000000000C91000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.micx2
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1769038692.0000000002BCE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: DpEFdRPYuiXBgv.exe, 00000007.00000002.1791097703.0000000002800000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name(
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1773784635.0000000007002000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00409340 SetWindowsHookExA 0000000D,0040932C,0000000011_2_00409340
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Bukti_Transfer...pdf.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,11_2_0040A65A
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,11_2_00414EC1
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,11_2_0040A65A
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,11_2_00409468

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.4194398776.000000000281F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000CDD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000D05000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769826597.0000000003BAB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1770743205.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000CB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.0000000003FD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.0000000004352000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769826597.0000000004873000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.00000000040D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 7092, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 2916, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 6884, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 7252, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0041A76C SystemParametersInfoW,11_2_0041A76C

                System Summary

                barindex
                Source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 00000000.00000002.1769826597.0000000003BAB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000007.00000002.1793107257.0000000003FD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 00000007.00000002.1793107257.0000000004352000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000000.00000002.1769826597.0000000004873000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000007.00000002.1793107257.00000000040D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 7092, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 6884, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 7252, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: initial sampleStatic PE information: Filename: Bukti_Transfer...pdf.exe
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,11_2_00414DB4
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_028C93D80_2_028C93D8
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_028C93C90_2_028C93C9
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_028C60600_2_028C6060
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_028C57D70_2_028C57D7
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_028C57F00_2_028C57F0
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_028C77080_2_028C7708
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_028C7FE00_2_028C7FE0
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_028C5C180_2_028C5C18
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_028C5C280_2_028C5C28
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1685B0_2_08F1685B
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F100400_2_08F10040
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F160480_2_08F16048
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1D1F00_2_08F1D1F0
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F181780_2_08F18178
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F172580_2_08F17258
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1EB680_2_08F1EB68
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F180780_2_08F18078
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1F0380_2_08F1F038
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1F0280_2_08F1F028
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F100060_2_08F10006
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1D1E00_2_08F1D1E0
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1A9B00_2_08F1A9B0
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F191800_2_08F19180
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F191700_2_08F19170
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1D9300_2_08F1D930
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1D9230_2_08F1D923
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1A3F00_2_08F1A3F0
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1A3E10_2_08F1A3E1
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1EB580_2_08F1EB58
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1D4880_2_08F1D488
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1E4880_2_08F1E488
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1D4790_2_08F1D479
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1E4790_2_08F1E479
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1A5600_2_08F1A560
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1A5500_2_08F1A550
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F155580_2_08F15558
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1D6D80_2_08F1D6D8
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1D6C80_2_08F1D6C8
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1DE010_2_08F1DE01
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1A7F00_2_08F1A7F0
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1A7E00_2_08F1A7E0
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F19FC00_2_08F19FC0
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F15FB00_2_08F15FB0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_0599A99B7_2_0599A99B
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_0599A9A07_2_0599A9A0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_072394187_2_07239418
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_072377087_2_07237708
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_072357F07_2_072357F0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_072357D97_2_072357D9
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_072394087_2_07239408
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_072360607_2_07236060
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_07237FE07_2_07237FE0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_07235C287_2_07235C28
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_07235C187_2_07235C18
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E685A7_2_087E685A
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E00407_2_087E0040
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E81787_2_087E8178
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087ED1F07_2_087ED1F0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E72587_2_087E7258
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E80787_2_087E8078
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EF0387_2_087EF038
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EF0287_2_087EF028
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E00237_2_087E0023
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E00127_2_087E0012
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E91707_2_087E9170
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EA9707_2_087EA970
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087ED9307_2_087ED930
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087ED9227_2_087ED922
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087ED1E07_2_087ED1E0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E91807_2_087E9180
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EEB687_2_087EEB68
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EEB587_2_087EEB58
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EA3F07_2_087EA3F0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EA3E17_2_087EA3E1
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EE3D07_2_087EE3D0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087ED4797_2_087ED479
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EE4797_2_087EE479
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087ED4887_2_087ED488
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EE4887_2_087EE488
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EA5607_2_087EA560
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E55587_2_087E5558
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EA5507_2_087EA550
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EDE017_2_087EDE01
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087ED6D87_2_087ED6D8
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087ED6C87_2_087ED6C8
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EA7F07_2_087EA7F0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087EA7E07_2_087EA7E0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E9FC07_2_087E9FC0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E5FB07_2_087E5FB0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0042515211_2_00425152
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0043528611_2_00435286
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004513D411_2_004513D4
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0045050B11_2_0045050B
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0043651011_2_00436510
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004316FB11_2_004316FB
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0043569E11_2_0043569E
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0044370011_2_00443700
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004257FB11_2_004257FB
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004128E311_2_004128E3
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0042596411_2_00425964
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0041B91711_2_0041B917
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0043D9CC11_2_0043D9CC
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00435AD311_2_00435AD3
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00424BC311_2_00424BC3
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0043DBFB11_2_0043DBFB
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0044ABA911_2_0044ABA9
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00433C0B11_2_00433C0B
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00434D8A11_2_00434D8A
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0043DE2A11_2_0043DE2A
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0041CEAF11_2_0041CEAF
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00435F0811_2_00435F08
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: String function: 00402073 appears 51 times
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: String function: 00432B90 appears 53 times
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: String function: 00432525 appears 41 times
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1766457345.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Bukti_Transfer...pdf.exe
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1774771410.00000000078C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Bukti_Transfer...pdf.exe
                Source: Bukti_Transfer...pdf.exe, 00000000.00000002.1769826597.0000000004609000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Bukti_Transfer...pdf.exe
                Source: Bukti_Transfer...pdf.exe, 00000000.00000000.1716820682.0000000000612000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePEZy.exe, vs Bukti_Transfer...pdf.exe
                Source: Bukti_Transfer...pdf.exeBinary or memory string: OriginalFilenamePEZy.exe, vs Bukti_Transfer...pdf.exe
                Source: Bukti_Transfer...pdf.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 00000000.00000002.1769826597.0000000003BAB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000007.00000002.1793107257.0000000003FD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 00000007.00000002.1793107257.0000000004352000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000000.00000002.1769826597.0000000004873000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000007.00000002.1793107257.00000000040D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 7092, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 6884, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 7252, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Bukti_Transfer...pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: DpEFdRPYuiXBgv.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, Twvgxw4lgXTPcYW2Tb.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, Twvgxw4lgXTPcYW2Tb.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, fXLqJaZr3ZehgnqFmw.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, fXLqJaZr3ZehgnqFmw.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, fXLqJaZr3ZehgnqFmw.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, Twvgxw4lgXTPcYW2Tb.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, Twvgxw4lgXTPcYW2Tb.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, fXLqJaZr3ZehgnqFmw.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, fXLqJaZr3ZehgnqFmw.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, fXLqJaZr3ZehgnqFmw.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, fXLqJaZr3ZehgnqFmw.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, fXLqJaZr3ZehgnqFmw.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, fXLqJaZr3ZehgnqFmw.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, Twvgxw4lgXTPcYW2Tb.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, Twvgxw4lgXTPcYW2Tb.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@16/13@2/3
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,11_2_00415C90
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040E2E7 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,11_2_0040E2E7
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,11_2_00419493
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_00418A00
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeFile created: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMutant created: NULL
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-YHG6AC
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3756:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4008:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMutant created: \Sessions\1\BaseNamedObjects\nwiojSsAhUZWdgjOnPrRyGbdeoC
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7208:120:WilError_03
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1D58.tmpJump to behavior
                Source: Bukti_Transfer...pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Bukti_Transfer...pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Bukti_Transfer...pdf.exeReversingLabs: Detection: 59%
                Source: Bukti_Transfer...pdf.exeVirustotal: Detection: 59%
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeFile read: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe"
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp2670.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess created: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe"
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp2670.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess created: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: Bukti_Transfer...pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Bukti_Transfer...pdf.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: Bukti_Transfer...pdf.exeStatic file information: File size 1398272 > 1048576
                Source: Bukti_Transfer...pdf.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x14b200
                Source: Bukti_Transfer...pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, fXLqJaZr3ZehgnqFmw.cs.Net Code: l1xlwE1WZN System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, fXLqJaZr3ZehgnqFmw.cs.Net Code: l1xlwE1WZN System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, fXLqJaZr3ZehgnqFmw.cs.Net Code: l1xlwE1WZN System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041A8DA
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_028CEC75 push FFFFFF8Bh; iretd 0_2_028CEC77
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F17C10 push cs; ret 0_2_08F17C11
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 0_2_08F1CF78 pushad ; retf 0_2_08F1CF79
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeCode function: 6_2_02B0F8C8 push eax; retf 6_2_02B0F8CA
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_059966F0 push esp; retf 7_2_059966F1
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_0723DEBC push dword ptr [edx+ebp*2-75h]; iretd 7_2_0723DEC7
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E7C10 push cs; ret 7_2_087E7C11
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 7_2_087E26C1 pushfd ; iretd 7_2_087E26CD
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004000D8 push es; iretd 11_2_004000D9
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040008C push es; iretd 11_2_0040008D
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004542E6 push ecx; ret 11_2_004542F9
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0045B4FD push esi; ret 11_2_0045B506
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00432BD6 push ecx; ret 11_2_00432BE9
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00454C08 push eax; ret 11_2_00454C26
                Source: Bukti_Transfer...pdf.exeStatic PE information: section name: .text entropy: 7.820209015446784
                Source: DpEFdRPYuiXBgv.exe.0.drStatic PE information: section name: .text entropy: 7.820209015446784
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, IaSsLW8eHVaf8frNXP.csHigh entropy of concatenated method names: 'BQJBDoTv5T', 'NvYBI7lph5', 'IT9BBgX8nx', 'M0yBT4VWyR', 'QaUBhgOK0U', 'wERBLNUewC', 'Dispose', 'GrQjQPjSJg', 'mGkjqbaD3E', 'UW0jmlVOkP'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, miGWcExx9v9K4L1Bjyb.csHigh entropy of concatenated method names: 'Qda2p91YjG', 'LiR2zxFTby', 'lXOTtNSKpC', 'sVgTx6fONN', 'JULTcgicPb', 'SGhTHwa4NK', 'sHoTlbvuXs', 'YPqTPmdXxa', 'tUuTQ32sLD', 'AYgTqiGeh9'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, AwDGCNzBynZ6Ehidob.csHigh entropy of concatenated method names: 'YO82rnkeFt', 'YFr24JU7aW', 'zDd2A5VMO3', 'z0H26OWNPD', 'gTY2XbVsGw', 'fnP2Ja1MDB', 'DYt213FpGg', 'O1X2LWgpd2', 'YcG2fabOeG', 'nu92okRUx2'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, CbxohvlAB82Biw87Y8.csHigh entropy of concatenated method names: 'zSMxFwvgxw', 'dgXxZTPcYW', 'APDxCUC4fs', 'TOOxV6xymO', 'dTBxDujkpi', 'JQRxGmlHIM', 'thmrTGq8tfqs2mB0ab', 'SjvGpJWiT0bjsoUvSZ', 'vt8xxSHFLK', 'EclxHlceDQ'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, fXLqJaZr3ZehgnqFmw.csHigh entropy of concatenated method names: 'LTuHP8taRE', 'Jr0HQhyv9t', 'RW0Hqiajyf', 'i7JHmDZ4MR', 'nSNHY29OCK', 'o3JHUByZn8', 'e5uHFRwFFs', 'wEqHZIclfa', 'Ns5H5K5jVA', 'of1HCeytXs'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, TZUF1XKt7kKv7V88au.csHigh entropy of concatenated method names: 'GDZFQvtXT8', 'NI0Fmwtmf2', 'qcfFU96Qa6', 'mdSUphcFyJ', 'QPDUzTwxy1', 'CiDFtWg17L', 'd5FFxogmk3', 'RivFc8JFtg', 'RiWFHdF9nW', 'nDeFljhivr'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, Opi1QR6mlHIM353G6s.csHigh entropy of concatenated method names: 'KrTUPL4236', 'fTAUqbO57T', 'XZqUYOdJVh', 'dCaUFyObEa', 'oUDUZIV9lQ', 'qsoYdqcGwN', 'QhYY0F4lnX', 'bElY84kvur', 'YVYYEtIiDo', 'nIBYOSfNsN'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, nnbrLvnLOKs5lGOW5V.csHigh entropy of concatenated method names: 'ER0W4qcDAS', 'go6WA3p2cY', 'RuKW6SsdeH', 'caaWXXv8D3', 'xffWJ6mK7P', 'HGxW1K8FJr', 'qFDWKLrT9u', 'DsyWbLqAZC', 'CcBWSGHFZN', 'dQ0Wk8kLC8'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, fpan69qLP81e0QSORl.csHigh entropy of concatenated method names: 'Dispose', 'mafxO8frNX', 'ILMcX6rT4s', 'LpPxccCkpN', 'eB1xpoeMVv', 'TGqxzbFPC8', 'ProcessDialogKey', 'iD4ctWMW8p', 'rkqcxSthMP', 'pi7ccqplKo'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, frh2muxtZwB0d6a1d5T.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Sl52kWIsTg', 'RX429agI4H', 'T7y2nkUIAg', 'Ro42NrOTt9', 'qST2yPOGlW', 'Dwr2iwrfXp', 'ThF2MHba9q'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, MsFfsfmPSWKMrhUb2v.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'VJvcOYItMG', 'fGjcpVXZw7', 'baFcz8tQ0f', 'BBLHtmDNsY', 'VYrHxJb6Ng', 'kU2HcEsXF8', 'DRXHH2s5SA', 'KYF2EVzcDQXFiDV2vH'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, XXjEqJg8MeSPvPXXL2.csHigh entropy of concatenated method names: 't9MFfWSLYT', 'egfFoRUc8N', 'vUVFwfyFSQ', 'Gr6FR2Y3Ca', 'gtbFv4OXsj', 'hVMFrmwIFv', 'GHyFe0qXPn', 'UTnF46xC13', 'mCHFAJ3s0w', 'SL1Fst8NuO'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, YMn9AKxHwMoIRxFyicj.csHigh entropy of concatenated method names: 'CXsTp6qvGA', 'K5LTzPnqfS', 'NtM3tlTOnS', 'LSevsnRmO2pxwa9wY2f', 'P1wq0qRX2vP6iqbN17F', 'v6kftDRHrfpqUypXd6n', 'lLSplhRqNJdTjrmNSPd', 'xUBLayRWoZ7G84mHyYL'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, pMa1C7N18slACZc2wG.csHigh entropy of concatenated method names: 'vxVDStXcJH', 'HHJD9RWAXO', 'P3lDNkWDfd', 'KqJDy4Z2oq', 'JuDDXZjx3R', 'mhxDu4S2sb', 'ALCDJ4oSS6', 'dKgD1SGVHB', 'bC4DauDgsE', 'pZYDKrFp0r'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, Twvgxw4lgXTPcYW2Tb.csHigh entropy of concatenated method names: 'X5bqNZadxv', 'fyEqygagu5', 'o3RqiC8r7I', 'crWqMqWsib', 'edCqdDtShe', 'Bg5q0Ogc9H', 'Oqtq8iMZ9D', 'cKFqElZXpY', 'l5sqOcI8eQ', 'Culqph7aYE'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, IOAVawxlKm0LBHPjgbc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VZP3BC2gWZ', 'aMx322jdAN', 'k7R3TSYG8a', 'Sqw332wirJ', 'NrC3h0lmWp', 'GgK37ELchf', 'HC63LIT0PM'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, DWMW8pOBkqSthMPGi7.csHigh entropy of concatenated method names: 'OBSB6NC0hf', 'qaJBX8SqdQ', 'fA8Bu41IpX', 'rRKBJOnkky', 'he7B1B5xm7', 'HBPBaRN7e4', 'RkhBKwUhy2', 'b7lBbjsZAd', 'miFBgfUebQ', 'tvUBSmi4c7'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, Q5Xx6ocReFAJ6LIDeR.csHigh entropy of concatenated method names: 'dwvwSRZ9y', 'yPdRgxj1K', 'tyqrOkBgw', 'q06eEbo3v', 'msfALvw0c', 'HQ1sAytlC', 'sXqCFY5xrvVpk3h8Mt', 'cRQUnDwUy09xFEoKX7', 'DBFFxccEOXoNReaIOD', 'cwXj06aO7'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, aVYc9U0dKqwV3XvNCZ.csHigh entropy of concatenated method names: 'oDyIEHVuPt', 'qJ7Ipm09tM', 'YC0jthGmLQ', 'w2bjxYAddl', 'bUJIkpFa5q', 'gX4I9FUH4w', 'GTuIn0buMc', 'RdrINqhww4', 'gloIy0Yrg3', 'IHOIi6nmSP'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, fplKo2pu6SkeJ6Yr4A.csHigh entropy of concatenated method names: 'oQu2mAulfL', 'Foi2Y5kQNU', 'vCK2USpZjt', 'WIm2FUlYMv', 'Sss2BjtU8Y', 'QuR2ZIfiPe', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Bukti_Transfer...pdf.exe.46c2868.0.raw.unpack, oC0CavAPDUC4fsMOO6.csHigh entropy of concatenated method names: 'pskmRFCh94', 'gR1mrmFGtc', 'biWm4lNHTq', 'nkZmA4SP9s', 'aPomDgtMKx', 'C4pmG2qh93', 'xqfmId758B', 'vFQmjQ76hI', 'AKPmBnUlQN', 's3Jm2bDHcS'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, IaSsLW8eHVaf8frNXP.csHigh entropy of concatenated method names: 'BQJBDoTv5T', 'NvYBI7lph5', 'IT9BBgX8nx', 'M0yBT4VWyR', 'QaUBhgOK0U', 'wERBLNUewC', 'Dispose', 'GrQjQPjSJg', 'mGkjqbaD3E', 'UW0jmlVOkP'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, miGWcExx9v9K4L1Bjyb.csHigh entropy of concatenated method names: 'Qda2p91YjG', 'LiR2zxFTby', 'lXOTtNSKpC', 'sVgTx6fONN', 'JULTcgicPb', 'SGhTHwa4NK', 'sHoTlbvuXs', 'YPqTPmdXxa', 'tUuTQ32sLD', 'AYgTqiGeh9'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, AwDGCNzBynZ6Ehidob.csHigh entropy of concatenated method names: 'YO82rnkeFt', 'YFr24JU7aW', 'zDd2A5VMO3', 'z0H26OWNPD', 'gTY2XbVsGw', 'fnP2Ja1MDB', 'DYt213FpGg', 'O1X2LWgpd2', 'YcG2fabOeG', 'nu92okRUx2'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, CbxohvlAB82Biw87Y8.csHigh entropy of concatenated method names: 'zSMxFwvgxw', 'dgXxZTPcYW', 'APDxCUC4fs', 'TOOxV6xymO', 'dTBxDujkpi', 'JQRxGmlHIM', 'thmrTGq8tfqs2mB0ab', 'SjvGpJWiT0bjsoUvSZ', 'vt8xxSHFLK', 'EclxHlceDQ'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, fXLqJaZr3ZehgnqFmw.csHigh entropy of concatenated method names: 'LTuHP8taRE', 'Jr0HQhyv9t', 'RW0Hqiajyf', 'i7JHmDZ4MR', 'nSNHY29OCK', 'o3JHUByZn8', 'e5uHFRwFFs', 'wEqHZIclfa', 'Ns5H5K5jVA', 'of1HCeytXs'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, TZUF1XKt7kKv7V88au.csHigh entropy of concatenated method names: 'GDZFQvtXT8', 'NI0Fmwtmf2', 'qcfFU96Qa6', 'mdSUphcFyJ', 'QPDUzTwxy1', 'CiDFtWg17L', 'd5FFxogmk3', 'RivFc8JFtg', 'RiWFHdF9nW', 'nDeFljhivr'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, Opi1QR6mlHIM353G6s.csHigh entropy of concatenated method names: 'KrTUPL4236', 'fTAUqbO57T', 'XZqUYOdJVh', 'dCaUFyObEa', 'oUDUZIV9lQ', 'qsoYdqcGwN', 'QhYY0F4lnX', 'bElY84kvur', 'YVYYEtIiDo', 'nIBYOSfNsN'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, nnbrLvnLOKs5lGOW5V.csHigh entropy of concatenated method names: 'ER0W4qcDAS', 'go6WA3p2cY', 'RuKW6SsdeH', 'caaWXXv8D3', 'xffWJ6mK7P', 'HGxW1K8FJr', 'qFDWKLrT9u', 'DsyWbLqAZC', 'CcBWSGHFZN', 'dQ0Wk8kLC8'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, fpan69qLP81e0QSORl.csHigh entropy of concatenated method names: 'Dispose', 'mafxO8frNX', 'ILMcX6rT4s', 'LpPxccCkpN', 'eB1xpoeMVv', 'TGqxzbFPC8', 'ProcessDialogKey', 'iD4ctWMW8p', 'rkqcxSthMP', 'pi7ccqplKo'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, frh2muxtZwB0d6a1d5T.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Sl52kWIsTg', 'RX429agI4H', 'T7y2nkUIAg', 'Ro42NrOTt9', 'qST2yPOGlW', 'Dwr2iwrfXp', 'ThF2MHba9q'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, MsFfsfmPSWKMrhUb2v.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'VJvcOYItMG', 'fGjcpVXZw7', 'baFcz8tQ0f', 'BBLHtmDNsY', 'VYrHxJb6Ng', 'kU2HcEsXF8', 'DRXHH2s5SA', 'KYF2EVzcDQXFiDV2vH'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, XXjEqJg8MeSPvPXXL2.csHigh entropy of concatenated method names: 't9MFfWSLYT', 'egfFoRUc8N', 'vUVFwfyFSQ', 'Gr6FR2Y3Ca', 'gtbFv4OXsj', 'hVMFrmwIFv', 'GHyFe0qXPn', 'UTnF46xC13', 'mCHFAJ3s0w', 'SL1Fst8NuO'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, YMn9AKxHwMoIRxFyicj.csHigh entropy of concatenated method names: 'CXsTp6qvGA', 'K5LTzPnqfS', 'NtM3tlTOnS', 'LSevsnRmO2pxwa9wY2f', 'P1wq0qRX2vP6iqbN17F', 'v6kftDRHrfpqUypXd6n', 'lLSplhRqNJdTjrmNSPd', 'xUBLayRWoZ7G84mHyYL'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, pMa1C7N18slACZc2wG.csHigh entropy of concatenated method names: 'vxVDStXcJH', 'HHJD9RWAXO', 'P3lDNkWDfd', 'KqJDy4Z2oq', 'JuDDXZjx3R', 'mhxDu4S2sb', 'ALCDJ4oSS6', 'dKgD1SGVHB', 'bC4DauDgsE', 'pZYDKrFp0r'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, Twvgxw4lgXTPcYW2Tb.csHigh entropy of concatenated method names: 'X5bqNZadxv', 'fyEqygagu5', 'o3RqiC8r7I', 'crWqMqWsib', 'edCqdDtShe', 'Bg5q0Ogc9H', 'Oqtq8iMZ9D', 'cKFqElZXpY', 'l5sqOcI8eQ', 'Culqph7aYE'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, IOAVawxlKm0LBHPjgbc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VZP3BC2gWZ', 'aMx322jdAN', 'k7R3TSYG8a', 'Sqw332wirJ', 'NrC3h0lmWp', 'GgK37ELchf', 'HC63LIT0PM'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, DWMW8pOBkqSthMPGi7.csHigh entropy of concatenated method names: 'OBSB6NC0hf', 'qaJBX8SqdQ', 'fA8Bu41IpX', 'rRKBJOnkky', 'he7B1B5xm7', 'HBPBaRN7e4', 'RkhBKwUhy2', 'b7lBbjsZAd', 'miFBgfUebQ', 'tvUBSmi4c7'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, Q5Xx6ocReFAJ6LIDeR.csHigh entropy of concatenated method names: 'dwvwSRZ9y', 'yPdRgxj1K', 'tyqrOkBgw', 'q06eEbo3v', 'msfALvw0c', 'HQ1sAytlC', 'sXqCFY5xrvVpk3h8Mt', 'cRQUnDwUy09xFEoKX7', 'DBFFxccEOXoNReaIOD', 'cwXj06aO7'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, aVYc9U0dKqwV3XvNCZ.csHigh entropy of concatenated method names: 'oDyIEHVuPt', 'qJ7Ipm09tM', 'YC0jthGmLQ', 'w2bjxYAddl', 'bUJIkpFa5q', 'gX4I9FUH4w', 'GTuIn0buMc', 'RdrINqhww4', 'gloIy0Yrg3', 'IHOIi6nmSP'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, fplKo2pu6SkeJ6Yr4A.csHigh entropy of concatenated method names: 'oQu2mAulfL', 'Foi2Y5kQNU', 'vCK2USpZjt', 'WIm2FUlYMv', 'Sss2BjtU8Y', 'QuR2ZIfiPe', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Bukti_Transfer...pdf.exe.477c088.3.raw.unpack, oC0CavAPDUC4fsMOO6.csHigh entropy of concatenated method names: 'pskmRFCh94', 'gR1mrmFGtc', 'biWm4lNHTq', 'nkZmA4SP9s', 'aPomDgtMKx', 'C4pmG2qh93', 'xqfmId758B', 'vFQmjQ76hI', 'AKPmBnUlQN', 's3Jm2bDHcS'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, IaSsLW8eHVaf8frNXP.csHigh entropy of concatenated method names: 'BQJBDoTv5T', 'NvYBI7lph5', 'IT9BBgX8nx', 'M0yBT4VWyR', 'QaUBhgOK0U', 'wERBLNUewC', 'Dispose', 'GrQjQPjSJg', 'mGkjqbaD3E', 'UW0jmlVOkP'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, miGWcExx9v9K4L1Bjyb.csHigh entropy of concatenated method names: 'Qda2p91YjG', 'LiR2zxFTby', 'lXOTtNSKpC', 'sVgTx6fONN', 'JULTcgicPb', 'SGhTHwa4NK', 'sHoTlbvuXs', 'YPqTPmdXxa', 'tUuTQ32sLD', 'AYgTqiGeh9'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, AwDGCNzBynZ6Ehidob.csHigh entropy of concatenated method names: 'YO82rnkeFt', 'YFr24JU7aW', 'zDd2A5VMO3', 'z0H26OWNPD', 'gTY2XbVsGw', 'fnP2Ja1MDB', 'DYt213FpGg', 'O1X2LWgpd2', 'YcG2fabOeG', 'nu92okRUx2'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, CbxohvlAB82Biw87Y8.csHigh entropy of concatenated method names: 'zSMxFwvgxw', 'dgXxZTPcYW', 'APDxCUC4fs', 'TOOxV6xymO', 'dTBxDujkpi', 'JQRxGmlHIM', 'thmrTGq8tfqs2mB0ab', 'SjvGpJWiT0bjsoUvSZ', 'vt8xxSHFLK', 'EclxHlceDQ'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, fXLqJaZr3ZehgnqFmw.csHigh entropy of concatenated method names: 'LTuHP8taRE', 'Jr0HQhyv9t', 'RW0Hqiajyf', 'i7JHmDZ4MR', 'nSNHY29OCK', 'o3JHUByZn8', 'e5uHFRwFFs', 'wEqHZIclfa', 'Ns5H5K5jVA', 'of1HCeytXs'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, TZUF1XKt7kKv7V88au.csHigh entropy of concatenated method names: 'GDZFQvtXT8', 'NI0Fmwtmf2', 'qcfFU96Qa6', 'mdSUphcFyJ', 'QPDUzTwxy1', 'CiDFtWg17L', 'd5FFxogmk3', 'RivFc8JFtg', 'RiWFHdF9nW', 'nDeFljhivr'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, Opi1QR6mlHIM353G6s.csHigh entropy of concatenated method names: 'KrTUPL4236', 'fTAUqbO57T', 'XZqUYOdJVh', 'dCaUFyObEa', 'oUDUZIV9lQ', 'qsoYdqcGwN', 'QhYY0F4lnX', 'bElY84kvur', 'YVYYEtIiDo', 'nIBYOSfNsN'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, nnbrLvnLOKs5lGOW5V.csHigh entropy of concatenated method names: 'ER0W4qcDAS', 'go6WA3p2cY', 'RuKW6SsdeH', 'caaWXXv8D3', 'xffWJ6mK7P', 'HGxW1K8FJr', 'qFDWKLrT9u', 'DsyWbLqAZC', 'CcBWSGHFZN', 'dQ0Wk8kLC8'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, fpan69qLP81e0QSORl.csHigh entropy of concatenated method names: 'Dispose', 'mafxO8frNX', 'ILMcX6rT4s', 'LpPxccCkpN', 'eB1xpoeMVv', 'TGqxzbFPC8', 'ProcessDialogKey', 'iD4ctWMW8p', 'rkqcxSthMP', 'pi7ccqplKo'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, frh2muxtZwB0d6a1d5T.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Sl52kWIsTg', 'RX429agI4H', 'T7y2nkUIAg', 'Ro42NrOTt9', 'qST2yPOGlW', 'Dwr2iwrfXp', 'ThF2MHba9q'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, MsFfsfmPSWKMrhUb2v.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'VJvcOYItMG', 'fGjcpVXZw7', 'baFcz8tQ0f', 'BBLHtmDNsY', 'VYrHxJb6Ng', 'kU2HcEsXF8', 'DRXHH2s5SA', 'KYF2EVzcDQXFiDV2vH'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, XXjEqJg8MeSPvPXXL2.csHigh entropy of concatenated method names: 't9MFfWSLYT', 'egfFoRUc8N', 'vUVFwfyFSQ', 'Gr6FR2Y3Ca', 'gtbFv4OXsj', 'hVMFrmwIFv', 'GHyFe0qXPn', 'UTnF46xC13', 'mCHFAJ3s0w', 'SL1Fst8NuO'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, YMn9AKxHwMoIRxFyicj.csHigh entropy of concatenated method names: 'CXsTp6qvGA', 'K5LTzPnqfS', 'NtM3tlTOnS', 'LSevsnRmO2pxwa9wY2f', 'P1wq0qRX2vP6iqbN17F', 'v6kftDRHrfpqUypXd6n', 'lLSplhRqNJdTjrmNSPd', 'xUBLayRWoZ7G84mHyYL'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, pMa1C7N18slACZc2wG.csHigh entropy of concatenated method names: 'vxVDStXcJH', 'HHJD9RWAXO', 'P3lDNkWDfd', 'KqJDy4Z2oq', 'JuDDXZjx3R', 'mhxDu4S2sb', 'ALCDJ4oSS6', 'dKgD1SGVHB', 'bC4DauDgsE', 'pZYDKrFp0r'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, Twvgxw4lgXTPcYW2Tb.csHigh entropy of concatenated method names: 'X5bqNZadxv', 'fyEqygagu5', 'o3RqiC8r7I', 'crWqMqWsib', 'edCqdDtShe', 'Bg5q0Ogc9H', 'Oqtq8iMZ9D', 'cKFqElZXpY', 'l5sqOcI8eQ', 'Culqph7aYE'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, IOAVawxlKm0LBHPjgbc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VZP3BC2gWZ', 'aMx322jdAN', 'k7R3TSYG8a', 'Sqw332wirJ', 'NrC3h0lmWp', 'GgK37ELchf', 'HC63LIT0PM'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, DWMW8pOBkqSthMPGi7.csHigh entropy of concatenated method names: 'OBSB6NC0hf', 'qaJBX8SqdQ', 'fA8Bu41IpX', 'rRKBJOnkky', 'he7B1B5xm7', 'HBPBaRN7e4', 'RkhBKwUhy2', 'b7lBbjsZAd', 'miFBgfUebQ', 'tvUBSmi4c7'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, Q5Xx6ocReFAJ6LIDeR.csHigh entropy of concatenated method names: 'dwvwSRZ9y', 'yPdRgxj1K', 'tyqrOkBgw', 'q06eEbo3v', 'msfALvw0c', 'HQ1sAytlC', 'sXqCFY5xrvVpk3h8Mt', 'cRQUnDwUy09xFEoKX7', 'DBFFxccEOXoNReaIOD', 'cwXj06aO7'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, aVYc9U0dKqwV3XvNCZ.csHigh entropy of concatenated method names: 'oDyIEHVuPt', 'qJ7Ipm09tM', 'YC0jthGmLQ', 'w2bjxYAddl', 'bUJIkpFa5q', 'gX4I9FUH4w', 'GTuIn0buMc', 'RdrINqhww4', 'gloIy0Yrg3', 'IHOIi6nmSP'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, fplKo2pu6SkeJ6Yr4A.csHigh entropy of concatenated method names: 'oQu2mAulfL', 'Foi2Y5kQNU', 'vCK2USpZjt', 'WIm2FUlYMv', 'Sss2BjtU8Y', 'QuR2ZIfiPe', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Bukti_Transfer...pdf.exe.78c0000.5.raw.unpack, oC0CavAPDUC4fsMOO6.csHigh entropy of concatenated method names: 'pskmRFCh94', 'gR1mrmFGtc', 'biWm4lNHTq', 'nkZmA4SP9s', 'aPomDgtMKx', 'C4pmG2qh93', 'xqfmId758B', 'vFQmjQ76hI', 'AKPmBnUlQN', 's3Jm2bDHcS'
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004063C6 ShellExecuteW,URLDownloadToFileW,11_2_004063C6
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeFile created: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp"
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_00418A00

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041A8DA
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 7092, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 6884, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040E18D Sleep,ExitProcess,11_2_0040E18D
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: 10C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: 2B60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: 28B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: 9060000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: A060000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: A270000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: B270000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: B690000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: C690000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: D690000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMemory allocated: 2740000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMemory allocated: 27B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMemory allocated: 47B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMemory allocated: 8930000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMemory allocated: 6DC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMemory allocated: 9930000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMemory allocated: A930000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMemory allocated: AF50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMemory allocated: BF50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,11_2_004186FE
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6578Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2998Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeWindow / User API: threadDelayed 9194Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeWindow / User API: foregroundWindowGot 1768Jump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeAPI coverage: 5.2 %
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe TID: 6160Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7072Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe TID: 7164Thread sleep count: 255 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe TID: 7164Thread sleep time: -127500s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe TID: 6196Thread sleep count: 302 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe TID: 6196Thread sleep time: -906000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe TID: 6196Thread sleep count: 9194 > 30Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe TID: 6196Thread sleep time: -27582000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe TID: 2836Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,11_2_0041A01B
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,11_2_0040B28E
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_0040838E
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_004087A0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,11_2_00407848
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004068CD FindFirstFileW,FindNextFileW,11_2_004068CD
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040AA71
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00417AAB
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040AC78
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00406D28
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: DpEFdRPYuiXBgv.exe, 00000007.00000002.1789728368.0000000000B66000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000CB7000.00000004.00000020.00020000.00000000.sdmp, Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000D2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_004327AE
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041A8DA
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004407B5 mov eax, dword ptr fs:[00000030h]11_2_004407B5
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,11_2_00410763
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_004327AE
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004328FC SetUnhandledExceptionFilter,11_2_004328FC
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_004398AC
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00432D5C
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe"
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMemory written: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMemory written: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe11_2_00410B5C
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004175E1 mouse_event,11_2_004175E1
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp1D58.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeProcess created: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe "C:\Users\user\Desktop\Bukti_Transfer...pdf.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DpEFdRPYuiXBgv" /XML "C:\Users\user\AppData\Local\Temp\tmp2670.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeProcess created: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe "C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe"Jump to behavior
                Source: Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000CDD000.00000004.00000020.00020000.00000000.sdmp, Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000D05000.00000004.00000020.00020000.00000000.sdmp, Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000D13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000D13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerAC\
                Source: Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000D13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                Source: Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000D13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers
                Source: Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000CDD000.00000004.00000020.00020000.00000000.sdmp, Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000D05000.00000004.00000020.00020000.00000000.sdmp, Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000D13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: Bukti_Transfer...pdf.exe, 00000006.00000002.4193882290.0000000000CB7000.00000004.00000020.00020000.00000000.sdmp, logs.dat.6.drBinary or memory string: [Program Manager]
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004329DA cpuid 11_2_004329DA
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: EnumSystemLocalesW,11_2_0044F17B
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: EnumSystemLocalesW,11_2_0044F130
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: EnumSystemLocalesW,11_2_0044F216
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,11_2_0044F2A3
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: GetLocaleInfoA,11_2_0040E2BB
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: GetLocaleInfoW,11_2_0044F4F3
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_0044F61C
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: GetLocaleInfoW,11_2_0044F723
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_0044F7F0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: EnumSystemLocalesW,11_2_00445914
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: GetLocaleInfoW,11_2_00445E1C
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,11_2_0044EEB8
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Users\user\Desktop\Bukti_Transfer...pdf.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeQueries volume information: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_0040A0B0 GetLocalTime,wsprintfW,11_2_0040A0B0
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004195F8 GetUserNameW,11_2_004195F8
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: 11_2_004468DC _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,11_2_004468DC
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.4194398776.000000000281F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000CDD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000D05000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769826597.0000000003BAB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1770743205.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000CB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.0000000003FD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.0000000004352000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769826597.0000000004873000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.00000000040D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 7092, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 2916, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 6884, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 7252, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data11_2_0040A953
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\11_2_0040AA71
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: \key3.db11_2_0040AA71

                Remote Access Functionality

                barindex
                Source: C:\Users\user\Desktop\Bukti_Transfer...pdf.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YHG6ACJump to behavior
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YHG6ACJump to behavior
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.48e9170.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.4352798.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 11.2.DpEFdRPYuiXBgv.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.DpEFdRPYuiXBgv.exe.40d8b98.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bukti_Transfer...pdf.exe.4873b50.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.4194398776.000000000281F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000CDD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000D05000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769826597.0000000003BAB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1770743205.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.4193882290.0000000000CB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.0000000003FD9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1769463250.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.0000000004352000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1769826597.0000000004873000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1793107257.00000000040D8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 7092, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bukti_Transfer...pdf.exe PID: 2916, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 6884, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: DpEFdRPYuiXBgv.exe PID: 7252, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Users\user\AppData\Roaming\DpEFdRPYuiXBgv.exeCode function: cmd.exe11_2_0040567A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                12
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Access Token Manipulation
                1
                Deobfuscate/Decode Files or Information
                211
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol211
                Input Capture
                2
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                1
                Windows Service
                4
                Obfuscated Files or Information
                2
                Credentials In Files
                1
                System Service Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts2
                Service Execution
                Login Hook122
                Process Injection
                12
                Software Packing
                NTDS3
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                Scheduled Task/Job
                1
                DLL Side-Loading
                LSA Secrets33
                System Information Discovery
                SSHKeylogging2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Masquerading
                Cached Domain Credentials121
                Security Software Discovery
                VNCGUI Input Capture22
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                Virtualization/Sandbox Evasion
                DCSync31
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Access Token Manipulation
                Proc Filesystem3
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt122
                Process Injection
                /etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1616515 Sample: Bukti_Transfer...pdf.exe Startdate: 16/02/2025 Architecture: WINDOWS Score: 100 45 austin99.duckdns.org 2->45 47 geoplugin.net 2->47 61 Suricata IDS alerts for network traffic 2->61 63 Found malware configuration 2->63 65 Malicious sample detected (through community Yara rule) 2->65 69 13 other signatures 2->69 8 Bukti_Transfer...pdf.exe 7 2->8         started        12 DpEFdRPYuiXBgv.exe 5 2->12         started        signatures3 67 Uses dynamic DNS services 45->67 process4 file5 35 C:\Users\user\AppData\...\DpEFdRPYuiXBgv.exe, PE32 8->35 dropped 37 C:\...\DpEFdRPYuiXBgv.exe:Zone.Identifier, ASCII 8->37 dropped 39 C:\Users\user\AppData\Local\...\tmp1D58.tmp, XML 8->39 dropped 41 C:\Users\...\Bukti_Transfer...pdf.exe.log, ASCII 8->41 dropped 71 Uses schtasks.exe or at.exe to add and modify task schedules 8->71 73 Adds a directory exclusion to Windows Defender 8->73 75 Injects a PE file into a foreign processes 8->75 14 Bukti_Transfer...pdf.exe 2 16 8->14         started        19 powershell.exe 23 8->19         started        21 schtasks.exe 1 8->21         started        77 Antivirus detection for dropped file 12->77 79 Multi AV Scanner detection for dropped file 12->79 81 Contains functionalty to change the wallpaper 12->81 83 4 other signatures 12->83 23 DpEFdRPYuiXBgv.exe 12->23         started        25 schtasks.exe 1 12->25         started        signatures6 process7 dnsIp8 49 austin99.duckdns.org 185.213.83.33, 49734, 9373 QUICKPACKETUS Germany 14->49 51 103.186.117.61, 64599, 9373 AARNET-AS-APAustralianAcademicandResearchNetworkAARNe unknown 14->51 53 geoplugin.net 178.237.33.50, 64600, 80 ATOM86-ASATOM86NL Netherlands 14->53 43 C:\ProgramData\remcos\logs.dat, data 14->43 dropped 55 Detected Remcos RAT 14->55 57 Installs a global keyboard hook 14->57 59 Loading BitLocker PowerShell Module 19->59 27 WmiPrvSE.exe 19->27         started        29 conhost.exe 19->29         started        31 conhost.exe 21->31         started        33 conhost.exe 25->33         started        file9 signatures10 process11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.