Loading ...

Play interactive tourEdit tour

Analysis Report K409476485-03032021000.pdf.exe

Overview

General Information

Sample Name:K409476485-03032021000.pdf.exe
Analysis ID:361816
MD5:88ff54784a623dcd43bb8c22491a5398
SHA1:873bb1426e0863be86a1df2d94ab33d8ac340d48
SHA256:93aacab7e09044795808ad1a0256c015271653ab0fe9d62785800c0f19ef1ad8
Tags:exeHawkEye
Infos:

Most interesting Screenshot:

Detection

HawkEye MailPassView
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected HawkEye Rat
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM_3
Yara detected HawkEye Keylogger
Yara detected MailPassView
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Binary contains a suspicious time stamp
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
AV process strings found (often used to terminate AV products)
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • K409476485-03032021000.pdf.exe (PID: 6960 cmdline: 'C:\Users\user\Desktop\K409476485-03032021000.pdf.exe' MD5: 88FF54784A623DCD43BB8C22491A5398)
    • K409476485-03032021000.pdf.exe (PID: 7072 cmdline: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe MD5: 88FF54784A623DCD43BB8C22491A5398)
      • vbc.exe (PID: 5752 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
      • vbc.exe (PID: 6324 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • cleanup

Malware Configuration

Threatname: HawkEye

{"Modules": ["WebBrowserPassView", "mailpv", "Mail PassView"], "Version": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpRAT_HawkEyeDetects HawkEye RATKevin Breen <kevin@techanarchy.net>
  • 0x7b719:$key: HawkEyeKeylogger
  • 0x7d917:$salt: 099u787978786
  • 0x7bd32:$string1: HawkEye_Keylogger
  • 0x7cb85:$string1: HawkEye_Keylogger
  • 0x7d877:$string1: HawkEye_Keylogger
  • 0x7c11b:$string2: holdermail.txt
  • 0x7c13b:$string2: holdermail.txt
  • 0x7c05d:$string3: wallet.dat
  • 0x7c075:$string3: wallet.dat
  • 0x7c08b:$string3: wallet.dat
  • 0x7d459:$string4: Keylog Records
  • 0x7d771:$string4: Keylog Records
  • 0x7d96f:$string5: do not script -->
  • 0x7b701:$string6: \pidloc.txt
  • 0x7b767:$string7: BSPLIT
  • 0x7b777:$string7: BSPLIT
00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
    00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpJoeSecurity_HawkEyeYara detected HawkEye KeyloggerJoe Security
      00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
        00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpHawkeyedetect HawkEye in memoryJPCERT/CC Incident Response Group
        • 0x7bd8a:$hawkstr1: HawkEye Keylogger
        • 0x7cbcb:$hawkstr1: HawkEye Keylogger
        • 0x7cefa:$hawkstr1: HawkEye Keylogger
        • 0x7d055:$hawkstr1: HawkEye Keylogger
        • 0x7d1b8:$hawkstr1: HawkEye Keylogger
        • 0x7d431:$hawkstr1: HawkEye Keylogger
        • 0x7b918:$hawkstr2: Dear HawkEye Customers!
        • 0x7cf4d:$hawkstr2: Dear HawkEye Customers!
        • 0x7d0a4:$hawkstr2: Dear HawkEye Customers!
        • 0x7d20b:$hawkstr2: Dear HawkEye Customers!
        • 0x7ba39:$hawkstr3: HawkEye Logger Details:
        Click to see the 20 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        3.2.K409476485-03032021000.pdf.exe.7d30000.11.raw.unpackHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
        • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
        3.2.K409476485-03032021000.pdf.exe.85c0000.12.raw.unpackHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
        • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
        3.2.K409476485-03032021000.pdf.exe.2db0cb4.5.raw.unpackHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
        • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
        3.2.K409476485-03032021000.pdf.exe.3d79930.8.raw.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
          3.2.K409476485-03032021000.pdf.exe.3d79930.8.raw.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
            Click to see the 58 entries

            Sigma Overview

            System Summary:

            barindex
            Sigma detected: Suspicious Double ExtensionShow sources
            Source: Process startedAuthor: Florian Roth (rule), @blu3_team (idea): Data: Command: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe, CommandLine: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe, NewProcessName: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe, OriginalFileName: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe, ParentCommandLine: 'C:\Users\user\Desktop\K409476485-03032021000.pdf.exe' , ParentImage: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe, ParentProcessId: 6960, ProcessCommandLine: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe, ProcessId: 7072

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: K409476485-03032021000.pdf.exe.7072.3.memstrMalware Configuration Extractor: HawkEye {"Modules": ["WebBrowserPassView", "mailpv", "Mail PassView"], "Version": ""}
            Multi AV Scanner detection for submitted fileShow sources
            Source: K409476485-03032021000.pdf.exeVirustotal: Detection: 37%Perma Link
            Source: K409476485-03032021000.pdf.exeReversingLabs: Detection: 19%
            Machine Learning detection for sampleShow sources
            Source: K409476485-03032021000.pdf.exeJoe Sandbox ML: detected
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpackAvira: Label: TR/Inject.vcoldi

            Compliance:

            barindex
            Detected unpacking (overwrites its own PE header)Show sources
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeUnpacked PE file: 1.2.K409476485-03032021000.pdf.exe.260000.0.unpack
            Uses 32bit PE filesShow sources
            Source: K409476485-03032021000.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
            Source: K409476485-03032021000.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Binary contains paths to debug symbolsShow sources
            Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp
            Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exe
            Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exe
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpBinary or memory string: autorun.inf
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpBinary or memory string: [autorun]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then push dword ptr [ebp-20h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then push dword ptr [ebp-20h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then xor edx, edx
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then xor edx, edx
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then push dword ptr [ebp-24h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then push dword ptr [ebp-24h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then call 0543A6E8h
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then call 0543A6E8h
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then call 0543A6E8h
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2020410 ET TROJAN HawkEye Keylogger FTP 192.168.2.6:49730 -> 103.27.200.199:21
            Source: global trafficTCP traffic: 192.168.2.6:49731 -> 103.27.200.199:35243
            Source: Joe Sandbox ViewIP Address: 103.27.200.199 103.27.200.199
            Source: Joe Sandbox ViewASN Name: BANGMODENTERPRISE-THBangmodEnterpriseCoLtdTH BANGMODENTERPRISE-THBangmodEnterpriseCoLtdTH
            Source: unknownFTP traffic detected: 103.27.200.199:21 -> 192.168.2.6:49730 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 8 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 8 of 50 allowed.220-Local time is now 14:49. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 8 of 50 allowed.220-Local time is now 14:49. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 8 of 50 allowed.220-Local time is now 14:49. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 8 of 50 allowed.220-Local time is now 14:49. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
            Source: vbc.exe, 00000007.00000003.378678575.0000000000ACE000.00000004.00000001.sdmpString found in binary or memory: 3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: vbc.exe, 00000007.00000003.378678575.0000000000ACE000.00000004.00000001.sdmpString found in binary or memory: 3D0%26installdataindex%3Dempty%26defaultbrowser%3D0https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exe, 00000007.00000002.378872120.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exe, 00000007.00000002.378872120.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: vbc.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpString found in binary or memory: s://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2
            Source: vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpString found in binary or memory: s://www.google.com/chrome/https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https://www.google.com/chrome/thank-you.htmlabout:blankhttps://adservice.google.co.uk/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://go.microsoft.com/fwlink/?LinkId=517287https://go.microsoft.com/fwlink/https://go.microsoft.com/fwlink/?LinkId=838604https://go.microsoft.com/fwlink/p/?LinkId=255141https://go.microsoft.com/fwlink/p/https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=7&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=199&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://contextual.media.net/medianet.phphttps://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=348&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%2C188%2C226&rtime=2&https=1&usp_status=0&usp_consent=1&dcfp=gdpr,usphttp://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.com/de-ch/https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://www.microsoft.com/en-us/welcomeie11/https://www.microsoft.com/en-us/edge?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edgehttps://www.microsoft.com/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/edge/https://www.microsoft.com/en-us/edge/?form=MA13DL&OCID=MA13DLhttps://www.microsoft.com/en-us/edge/http://go.microsoft.com/fwlink/?LinkId=838604http://go.microsoft.com/fwlink/http://go.microsoft.com/fwlink/p/?LinkId=255141http://go.microsoft.com/fwlink/p/res://C:\Windows\system32\mmcndmgr.dll/views.htmhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2F?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=3005540662929;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fhttps://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2Fchrome%2Fthank-you.html%3Fstatcb%3D0%26installdataindex%3Dempty%26defaultbrowser%3D0?https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7859736938632;gtm=2wg9g1;~oref=https%3A%2F%2Fwww.google.com%2
            Source: unknownDNS traffic detected: queries for: 10.76.9.0.in-addr.arpa
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.339668576.0000000006003000.00000004.00000001.sdmpString found in binary or memory: http://en.w
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.337044965.000000000603E000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.comKo
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.337965083.000000000603E000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.como
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.591710521.000000000302E000.00000004.00000001.sdmpString found in binary or memory: http://ftp.triplelink.co.th
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmp, K409476485-03032021000.pdf.exe, 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com/-
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.343783361.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.342836300.0000000006002000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comL
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.342836300.0000000006002000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comQ
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.342836300.0000000006002000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn-u
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.342836300.0000000006002000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn-un
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com-gn
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers$
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.348081975.000000000600D000.00000004.00000001.sdmp, K409476485-03032021000.pdf.exe, 00000003.00000003.345282412.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designerss
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.345282412.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comFe
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comT.TTFJ
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comX
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.596348173.0000000006000000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.coma
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.596348173.0000000006000000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comae
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalic
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comals
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.348081975.000000000600D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdkoX
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.596348173.0000000006000000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comepkoW
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comessed=
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comion
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comlic
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comoitu
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.336579575.00000000014CB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comnd
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.339668576.0000000006003000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnd
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.344221992.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.343783361.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/-usX
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.343140401.0000000006007000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/J
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.343783361.000000000600A000.00000004.00000001.sdmp, K409476485-03032021000.pdf.exe, 00000003.00000003.343140401.0000000006007000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.343140401.0000000006007000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/4
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.343140401.0000000006007000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/=
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.344221992.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/l-gn
            Source: vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpString found in binary or memory: http://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.co
            Source: vbc.exe, vbc.exe, 00000007.00000002.378872120.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.336106778.000000000603E000.00000004.00000001.sdmp, K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.336106778.000000000603E000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com5
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.336603366.000000000603E000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comg
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.335457848.00000000014CB000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.coml
            Source: K409476485-03032021000.pdf.exe, 00000003.00000003.343783361.000000000600A000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: http://www.site.com/logs.php
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: vbc.exe, 00000007.00000003.378592469.00000000020FC000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activi
            Source: vbc.exe, 00000007.00000003.378678575.0000000000ACE000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;g
            Source: vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpString found in binary or memory: https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=30055406629
            Source: vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
            Source: vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&
            Source: vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://c
            Source: vbc.exeString found in binary or memory: https://login.yahoo.com/config/login
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
            Source: vbc.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0https:/

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K409476485-03032021000.pdf.exe PID: 7072, type: MEMORY
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.45fa72.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.2d9b520.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.408208.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.409c0d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.43175f0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.426efd0.4.raw.unpack, type: UNPACKEDPE
            Contains functionality to log keystrokes (.Net Source)Show sources
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.cs.Net Code: HookKeyboard
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040AC8A GetTempPathA,GetWindowsDirectoryA,GetTempFileNameA,OpenClipboard,GetLastError,DeleteFileA,

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.K409476485-03032021000.pdf.exe.45fa72.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 3.2.K409476485-03032021000.pdf.exe.45fa72.1.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.K409476485-03032021000.pdf.exe.2d9b520.6.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.K409476485-03032021000.pdf.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 3.2.K409476485-03032021000.pdf.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 3.2.K409476485-03032021000.pdf.exe.409c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 3.2.K409476485-03032021000.pdf.exe.409c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.K409476485-03032021000.pdf.exe.43175f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 1.2.K409476485-03032021000.pdf.exe.43175f0.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.K409476485-03032021000.pdf.exe.426efd0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 1.2.K409476485-03032021000.pdf.exe.426efd0.4.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
            Initial sample is a PE file and has a suspicious nameShow sources
            Source: initial sampleStatic PE information: Filename: K409476485-03032021000.pdf.exe
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD89A0 NtSetContextThread,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD8994 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD897C NtResumeThread,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FDF778 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FDF618 NtResumeThread,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD89B8 NtResumeThread,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD89AC NtSetContextThread,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD8964 NtResumeThread,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD8958 NtSetContextThread,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD894C NtSetContextThread,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD8940 NtWriteVirtualMemory,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD8928 NtResumeThread,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FDF830 NtSetContextThread,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_04CA81A8
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_04CA81B8
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_04CA0AF3
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_04CA0B00
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_04CA7378
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_04CA7370
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_04CADF88
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_07EB62C0
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_07EBA028
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FBBDB0
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FBB4E0
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FBEEC8
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FBB198
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FB0006
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FDB540
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FDBD32
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FDEC50
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD9C20
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD3BE8
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD2BA8
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD6B20
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD22B8
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD9C10
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD3BD7
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD22A9
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00404DDB
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040BD8A
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00404E4C
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00404EBD
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00404F4E
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00404419
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00404516
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00413538
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004145A1
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040E639
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004337AF
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004399B1
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0043DAE7
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00405CF6
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00403F85
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00411F99
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413F8E appears 66 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413E2D appears 34 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00442A90 appears 36 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 004141D6 appears 88 times
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00411538 appears 35 times
            Source: K409476485-03032021000.pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: K409476485-03032021000.pdf.exeBinary or memory string: OriginalFilename vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAsyncState.dllF vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePhulli.exe0 vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.332035385.00000000003A2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCallerLineNumberAttribute.exe6 vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.343990844.0000000007DF0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLegacyPathHandling.dllN vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exeBinary or memory string: OriginalFilename vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589462153.0000000000972000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameCallerLineNumberAttribute.exe6 vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589409174.0000000000482000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamePhulli.exe0 vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exeBinary or memory string: OriginalFilenameCallerLineNumberAttribute.exe6 vs K409476485-03032021000.pdf.exe
            Source: K409476485-03032021000.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000002.598275210.0000000007D30000.00000004.00000001.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 00000003.00000002.598580548.00000000085C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.K409476485-03032021000.pdf.exe.7d30000.11.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.K409476485-03032021000.pdf.exe.85c0000.12.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.K409476485-03032021000.pdf.exe.2db0cb4.5.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.K409476485-03032021000.pdf.exe.45fa72.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 3.2.K409476485-03032021000.pdf.exe.45fa72.1.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 3.2.K409476485-03032021000.pdf.exe.2d9b520.6.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.K409476485-03032021000.pdf.exe.2d9b520.6.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 3.2.K409476485-03032021000.pdf.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.K409476485-03032021000.pdf.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 3.2.K409476485-03032021000.pdf.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 3.2.K409476485-03032021000.pdf.exe.409c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 3.2.K409476485-03032021000.pdf.exe.409c0d.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.K409476485-03032021000.pdf.exe.43175f0.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.K409476485-03032021000.pdf.exe.43175f0.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 1.2.K409476485-03032021000.pdf.exe.43175f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.K409476485-03032021000.pdf.exe.426efd0.4.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
            Source: 1.2.K409476485-03032021000.pdf.exe.426efd0.4.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
            Source: 1.2.K409476485-03032021000.pdf.exe.426efd0.4.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
            Source: K409476485-03032021000.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.csBase64 encoded string: 'xZv2KTjDOGwMPewlL06/2/+cBh+3YNzZLNYqWwxyouAodILYLJV9xZ9CGhDaO0jH', 'G9O9EXxYbTKbu/JIqZ4FXWAEsGCT7RJ+/SHmPiE44HoRMOAUDNTRY4dL0xxXj+PX', 'yFzOCZnSHgqZgbtRiX7zTTL1Qt6D+8cCFAWN8MP9eKKls7OaJo1TF2n4j++JkQX9', 'O6ZQ7J5ocLxf6RhQQpNSk/JzuZPUi9E0JuztOnaE/Qd705fOtAkyZW1GYthg8J6YkNuszS5M9pYlCk2wrogMRg==', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@7/4@2/1
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00415AFD GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00415F87 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00411196 CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,QueryFullProcessImageNameW,QueryFullProcessImageNameW,CloseHandle,free,Process32NextW,CloseHandle,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040ED0B FindResourceA,SizeofResource,LoadResource,LockResource,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\K409476485-03032021000.pdf.exe.logJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\holdermail.txtJump to behavior
            Source: K409476485-03032021000.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeSystem information queried: HandleInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exe, 00000007.00000002.378872120.0000000000400000.00000040.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: K409476485-03032021000.pdf.exeVirustotal: Detection: 37%
            Source: K409476485-03032021000.pdf.exeReversingLabs: Detection: 19%
            Source: unknownProcess created: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe 'C:\Users\user\Desktop\K409476485-03032021000.pdf.exe'
            Source: unknownProcess created: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe C:\Users\user\Desktop\K409476485-03032021000.pdf.exe
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
            Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess created: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe C:\Users\user\Desktop\K409476485-03032021000.pdf.exe
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
            Source: K409476485-03032021000.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: K409476485-03032021000.pdf.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: K409476485-03032021000.pdf.exeStatic file information: File size 1488384 > 1048576
            Source: K409476485-03032021000.pdf.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x13fe00
            Source: K409476485-03032021000.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp
            Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exe
            Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, vbc.exe

            Data Obfuscation:

            barindex
            Detected unpacking (changes PE section rights)Show sources
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeUnpacked PE file: 1.2.K409476485-03032021000.pdf.exe.260000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
            Detected unpacking (overwrites its own PE header)Show sources
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeUnpacked PE file: 1.2.K409476485-03032021000.pdf.exe.260000.0.unpack
            .NET source code contains potential unpackerShow sources
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Binary contains a suspicious time stampShow sources
            Source: initial sampleStatic PE information: 0xC9509DF1 [Sun Jan 10 11:28:49 2077 UTC]
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00403C3D LoadLibraryA,GetProcAddress,strcpy,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_07EB407F push cs; retf
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 1_2_07EB3C36 push eax; iretd
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD05B0 pushfd ; retf
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeCode function: 3_2_05FD4B7A pushad ; retf
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00411879 push ecx; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_004118A0 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_004118A0 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00442871 push ecx; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00442A90 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00442A90 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00446E54 push eax; ret
            Source: initial sampleStatic PE information: section name: .text entropy: 7.86302896001

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Changes the view of files in windows explorer (hidden files and folders)Show sources
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced HiddenJump to behavior
            Uses an obfuscated file name to hide its real file extension (double extension)Show sources
            Source: Possible double extension: pdf.exeStatic PE information: K409476485-03032021000.pdf.exe
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040F64B memset,strcpy,memset,strcpy,strcat,strcpy,strcat,GetModuleHandleA,LoadLibraryExA,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM_3Show sources
            Source: Yara matchFile source: 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K409476485-03032021000.pdf.exe PID: 6960, type: MEMORY
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.2862894.1.raw.unpack, type: UNPACKEDPE
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeThread delayed: delay time: 180000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeWindow / User API: threadDelayed 445
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe TID: 6964Thread sleep time: -99589s >= -30000s
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe TID: 7028Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe TID: 6148Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe TID: 5756Thread sleep time: -120000s >= -30000s
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe TID: 5220Thread sleep time: -140000s >= -30000s
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe TID: 5216Thread sleep time: -89000s >= -30000s
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe TID: 6528Thread sleep time: -180000s >= -30000s
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeLast function: Thread delayed
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004161B0 memset,GetSystemInfo,
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: K409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess information queried: ProcessInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408836 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,FreeLibrary,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00403C3D LoadLibraryA,GetProcAddress,strcpy,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            .NET source code references suspicious native API functionsShow sources
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
            Sample uses process hollowing techniqueShow sources
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
            Writes to foreign memory regionsShow sources
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 412000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 416000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 418000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 443000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 44F000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 452000
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess created: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe C:\Users\user\Desktop\K409476485-03032021000.pdf.exe
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.590727552.00000000016D0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.590727552.00000000016D0000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.590727552.00000000016D0000.00000002.00000001.sdmpBinary or memory string: &Program Manager
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.590727552.00000000016D0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0041604B GetSystemTime,memcpy,GetCurrentProcessId,memcpy,GetTickCount,memcpy,QueryPerformanceCounter,memcpy,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_0040724C memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 6_2_00406278 GetVersionExA,
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.597712341.000000000761F000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
            Source: C:\Users\user\Desktop\K409476485-03032021000.pdf.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

            Stealing of Sensitive Information:

            barindex
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K409476485-03032021000.pdf.exe PID: 7072, type: MEMORY
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.45fa72.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.2d9b520.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.408208.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.409c0d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.43175f0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.426efd0.4.raw.unpack, type: UNPACKEDPE
            Yara detected MailPassViewShow sources
            Source: Yara matchFile source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.593126682.0000000003D71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.375467780.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K409476485-03032021000.pdf.exe PID: 7072, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 5752, type: MEMORY
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.3d79930.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.45fa72.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.45fa72.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.408208.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.3d79930.8.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.409c0d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.43175f0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.426efd0.4.raw.unpack, type: UNPACKEDPE
            Tries to harvest and steal browser information (history, passwords, etc)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
            Tries to steal Instant Messenger accounts or passwordsShow sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Dynamic Salt
            Tries to steal Mail credentials (via file access)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
            Tries to steal Mail credentials (via file registry)Show sources
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, PopPassword
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, SMTPPassword
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: ESMTPPassword
            Yara detected WebBrowserPassView password recovery toolShow sources
            Source: Yara matchFile source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.378872120.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.593126682.0000000003D71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K409476485-03032021000.pdf.exe PID: 7072, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6324, type: MEMORY
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.3d79930.8.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.3d91b50.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.409c0d.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.408208.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.3d91b50.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.409c0d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.43175f0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.426efd0.4.raw.unpack, type: UNPACKEDPE

            Remote Access Functionality:

            barindex
            Detected HawkEye RatShow sources
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: HawkEyeKeylogger
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: l&HawkEye_Keylogger_Execution_Confirmed_
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmpString found in binary or memory: l"HawkEye_Keylogger_Stealer_Records_
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.591710521.000000000302E000.00000004.00000001.sdmpString found in binary or memory: l@HawkEye_Keylogger_Stealer_Records_609290 3.3.2021 9:01:04 AM.txt
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.591710521.000000000302E000.00000004.00000001.sdmpString found in binary or memory: l[ftp://ftp.triplelink.co.th/HawkEye_Keylogger_Stealer_Records_609290 3.3.2021 9:01:04 AM.txt
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.591710521.000000000302E000.00000004.00000001.sdmpString found in binary or memory: ftp://ftp.triplelink.co.th/HawkEye_Keylogger_Stealer_Records_609290%203.3.2021%209:01:04%20AM.txt
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.591710521.000000000302E000.00000004.00000001.sdmpString found in binary or memory: laftp://ftp.triplelink.co.th/HawkEye_Keylogger_Stealer_Records_609290%203.3.2021%209:01:04%20AM.txt
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.591739731.0000000003043000.00000004.00000001.sdmpString found in binary or memory: l@HawkEye_Keylogger_Stealer_Records_609290 3.3.2021 9:01:04 AM.txtP
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.591739731.0000000003043000.00000004.00000001.sdmpString found in binary or memory: lGSTOR HawkEye_Keylogger_Stealer_Records_609290 3.3.2021 9:01:04 AM.txt
            Source: K409476485-03032021000.pdf.exe, 00000003.00000002.591739731.0000000003043000.00000004.00000001.sdmpString found in binary or memory: STOR HawkEye_Keylogger_Stealer_Records_609290 3.3.2021 9:01:04 AM.txt
            Yara detected HawkEye KeyloggerShow sources
            Source: Yara matchFile source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: K409476485-03032021000.pdf.exe PID: 7072, type: MEMORY
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.45fa72.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.2d9b520.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.408208.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.2.K409476485-03032021000.pdf.exe.409c0d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.43175f0.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.45462a0.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.K409476485-03032021000.pdf.exe.426efd0.4.raw.unpack, type: UNPACKEDPE

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Replication Through Removable Media1Windows Management Instrumentation1Application Shimming1Application Shimming1Disable or Modify Tools1OS Credential Dumping1System Time Discovery1Replication Through Removable Media1Archive Collected Data11Exfiltration Over Alternative Protocol1Encrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsNative API11Boot or Logon Initialization ScriptsProcess Injection312Deobfuscate/Decode Files or Information11Input Capture1Peripheral Device Discovery1Remote Desktop ProtocolData from Local System1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsShared Modules1Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information141Credentials in Registry2Account Discovery1SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing33Credentials In Files1File and Directory Discovery1Distributed Component Object ModelInput Capture1Scheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptTimestomp1LSA SecretsSystem Information Discovery18SSHClipboard Data1Data Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading11Cached Domain CredentialsSecurity Software Discovery131VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion2DCSyncVirtualization/Sandbox Evasion2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection312Proc FilesystemProcess Discovery4Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowApplication Window Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingSystem Owner/User Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
            Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRight-to-Left OverrideInput CaptureRemote System Discovery1Replication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 361816 Sample: K409476485-03032021000.pdf.exe Startdate: 03/03/2021 Architecture: WINDOWS Score: 100 26 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->26 28 Found malware configuration 2->28 30 Malicious sample detected (through community Yara rule) 2->30 32 15 other signatures 2->32 7 K409476485-03032021000.pdf.exe 3 2->7         started        process3 file4 20 C:\...\K409476485-03032021000.pdf.exe.log, ASCII 7->20 dropped 34 Detected unpacking (changes PE section rights) 7->34 36 Detected unpacking (overwrites its own PE header) 7->36 38 Injects a PE file into a foreign processes 7->38 11 K409476485-03032021000.pdf.exe 15 4 7->11         started        signatures5 process6 dnsIp7 22 ftp.triplelink.co.th 103.27.200.199, 21, 35243, 49730 BANGMODENTERPRISE-THBangmodEnterpriseCoLtdTH Thailand 11->22 24 10.76.9.0.in-addr.arpa 11->24 40 Changes the view of files in windows explorer (hidden files and folders) 11->40 42 Writes to foreign memory regions 11->42 44 Sample uses process hollowing technique 11->44 46 Injects a PE file into a foreign processes 11->46 15 vbc.exe 1 11->15         started        18 vbc.exe 13 11->18         started        signatures8 process9 signatures10 48 Tries to steal Mail credentials (via file registry) 15->48 50 Tries to steal Instant Messenger accounts or passwords 15->50 52 Tries to steal Mail credentials (via file access) 15->52 54 Tries to harvest and steal browser information (history, passwords, etc) 18->54

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            K409476485-03032021000.pdf.exe37%VirustotalBrowse
            K409476485-03032021000.pdf.exe19%ReversingLabsWin32.Trojan.Generic
            K409476485-03032021000.pdf.exe100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            7.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
            3.2.K409476485-03032021000.pdf.exe.400000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
            3.2.K409476485-03032021000.pdf.exe.400000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
            1.2.K409476485-03032021000.pdf.exe.260000.0.unpack100%AviraHEUR/AGEN.1109526Download File
            1.2.K409476485-03032021000.pdf.exe.45462a0.3.unpack100%AviraTR/Inject.vcoldiDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://www.carterandcone.comn-u0%URL Reputationsafe
            http://www.carterandcone.comn-u0%URL Reputationsafe
            http://www.carterandcone.comn-u0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://www.fonts.comnd0%Avira URL Cloudsafe
            http://www.sajatypeworks.com50%Avira URL Cloudsafe
            http://www.fontbureau.comT.TTFJ0%Avira URL Cloudsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/40%Avira URL Cloudsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.fontbureau.com-gn0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/jp/=0%Avira URL Cloudsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.fontbureau.comepkoW0%Avira URL Cloudsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.carterandcone.comQ0%Avira URL Cloudsafe
            http://www.carterandcone.comn-un0%Avira URL Cloudsafe
            http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
            http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
            http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://fontfabrik.comKo0%Avira URL Cloudsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.sajatypeworks.comg0%Avira URL Cloudsafe
            http://www.carterandcone.comL0%Avira URL Cloudsafe
            http://www.sajatypeworks.coml0%Avira URL Cloudsafe
            http://fontfabrik.como0%Avira URL Cloudsafe
            http://www.fontbureau.comae0%Avira URL Cloudsafe
            http://www.founder.com.cn/cnd0%URL Reputationsafe
            http://www.founder.com.cn/cnd0%URL Reputationsafe
            http://www.founder.com.cn/cnd0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/J0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/l-gn0%Avira URL Cloudsafe
            http://www.fontbureau.comion0%URL Reputationsafe
            http://www.fontbureau.comion0%URL Reputationsafe
            http://www.fontbureau.comion0%URL Reputationsafe
            http://www.fontbureau.comdkoX0%Avira URL Cloudsafe
            http://www.fontbureau.comX0%Avira URL Cloudsafe
            http://www.fontbureau.comlic0%Avira URL Cloudsafe
            http://www.fontbureau.comessed=0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
            http://www.fontbureau.coma0%URL Reputationsafe
            http://www.fontbureau.coma0%URL Reputationsafe
            http://www.fontbureau.coma0%URL Reputationsafe
            http://www.fontbureau.comd0%URL Reputationsafe
            http://www.fontbureau.comd0%URL Reputationsafe
            http://www.fontbureau.comd0%URL Reputationsafe
            http://en.w0%URL Reputationsafe
            http://en.w0%URL Reputationsafe
            http://en.w0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.fontbureau.comoitu0%URL Reputationsafe
            http://www.fontbureau.comoitu0%URL Reputationsafe
            http://www.fontbureau.comoitu0%URL Reputationsafe
            http://ftp.triplelink.co.th0%Avira URL Cloudsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.fontbureau.comFe0%Avira URL Cloudsafe
            http://www.fontbureau.comals0%URL Reputationsafe
            http://www.fontbureau.comals0%URL Reputationsafe
            http://www.fontbureau.comals0%URL Reputationsafe
            http://www.fontbureau.comalic0%URL Reputationsafe
            http://www.fontbureau.comalic0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            ftp.triplelink.co.th
            103.27.200.199
            truetrue
              unknown
              10.76.9.0.in-addr.arpa
              unknown
              unknownfalse
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://www.fontbureau.com/designersGK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                  high
                  http://www.carterandcone.comn-uK409476485-03032021000.pdf.exe, 00000003.00000003.342836300.0000000006002000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.fontbureau.com/designers/?K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fonts.comndK409476485-03032021000.pdf.exe, 00000003.00000003.336579575.00000000014CB000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.sajatypeworks.com5K409476485-03032021000.pdf.exe, 00000003.00000003.336106778.000000000603E000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.com/designers?K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                      high
                      http://www.fontbureau.comT.TTFJK409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.tiro.comK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                        high
                        http://www.jiyu-kobo.co.jp/jp/4K409476485-03032021000.pdf.exe, 00000003.00000003.343140401.0000000006007000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.goodfont.co.krK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com-gnK409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.cssK409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmpfalse
                          high
                          http://www.jiyu-kobo.co.jp/jp/=K409476485-03032021000.pdf.exe, 00000003.00000003.343140401.0000000006007000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.sajatypeworks.comK409476485-03032021000.pdf.exe, 00000003.00000003.336106778.000000000603E000.00000004.00000001.sdmp, K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cn/cTheK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://2542116.fls.doubleclick.net/activityi;src=2542116;type=chrom322;cat=chrom01g;ord=30055406629vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpfalse
                            high
                            http://fontfabrik.comK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpfalse
                              high
                              http://www.fontbureau.comepkoWK409476485-03032021000.pdf.exe, 00000003.00000002.596348173.0000000006000000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://whatismyipaddress.com/-K409476485-03032021000.pdf.exe, 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmpfalse
                                high
                                http://www.galapagosdesign.com/DPleaseK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comQK409476485-03032021000.pdf.exe, 00000003.00000003.342836300.0000000006002000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comn-unK409476485-03032021000.pdf.exe, 00000003.00000003.342836300.0000000006002000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.ascendercorp.com/typedesigners.htmlK409476485-03032021000.pdf.exe, 00000003.00000003.343783361.000000000600A000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                https://login.yahoo.com/config/loginvbc.exefalse
                                  high
                                  http://www.fonts.comK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.sandoll.co.krK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.site.com/logs.phpK409476485-03032021000.pdf.exe, 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmpfalse
                                      high
                                      https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1https://cvbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.urwpp.deDPleaseK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.nirsoft.net/vbc.exe, vbc.exe, 00000007.00000002.378872120.0000000000400000.00000040.00000001.sdmpfalse
                                          high
                                          http://www.zhongyicts.com.cnK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://fontfabrik.comKoK409476485-03032021000.pdf.exe, 00000003.00000003.337044965.000000000603E000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://contextual.media.net/checksync.phphttps://contextual.media.net/checksync.php?&vsSync=1&cs=1&vbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpfalse
                                            high
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameK409476485-03032021000.pdf.exe, 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmp, K409476485-03032021000.pdf.exe, 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.sakkal.comK409476485-03032021000.pdf.exe, 00000003.00000003.343783361.000000000600A000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              • URL Reputation: safe
                                              unknown
                                              http://www.sajatypeworks.comgK409476485-03032021000.pdf.exe, 00000003.00000003.336603366.000000000603E000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.carterandcone.comLK409476485-03032021000.pdf.exe, 00000003.00000003.342836300.0000000006002000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designerssK409476485-03032021000.pdf.exe, 00000003.00000003.348081975.000000000600D000.00000004.00000001.sdmp, K409476485-03032021000.pdf.exe, 00000003.00000003.345282412.000000000600A000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.sajatypeworks.comlK409476485-03032021000.pdf.exe, 00000003.00000003.335457848.00000000014CB000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://fontfabrik.comoK409476485-03032021000.pdf.exe, 00000003.00000003.337965083.000000000603E000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.comaeK409476485-03032021000.pdf.exe, 00000003.00000002.596348173.0000000006000000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.founder.com.cn/cndK409476485-03032021000.pdf.exe, 00000003.00000003.339668576.0000000006003000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                https://2542116.fls.doubleclick.net/activivbc.exe, 00000007.00000003.378592469.00000000020FC000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.apache.org/licenses/LICENSE-2.0K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://www.fontbureau.comK409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpfalse
                                                      high
                                                      http://www.msn.com/?ocid=iehphttp://www.msn.com/http://www.msn.com/de-ch/?ocid=iehphttp://www.msn.covbc.exe, 00000007.00000003.378615686.0000000000ACC000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://www.jiyu-kobo.co.jp/JK409476485-03032021000.pdf.exe, 00000003.00000003.343140401.0000000006007000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.jiyu-kobo.co.jp/l-gnK409476485-03032021000.pdf.exe, 00000003.00000003.344221992.000000000600A000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.fontbureau.comionK409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.fontbureau.comdkoXK409476485-03032021000.pdf.exe, 00000003.00000003.348081975.000000000600D000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.fontbureau.comXK409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.fontbureau.comlicK409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chom0;ord=9774759596232;gvbc.exe, 00000007.00000003.378678575.0000000000ACE000.00000004.00000001.sdmpfalse
                                                          high
                                                          http://www.fontbureau.comessed=K409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          low
                                                          http://www.jiyu-kobo.co.jp/jp/K409476485-03032021000.pdf.exe, 00000003.00000003.343783361.000000000600A000.00000004.00000001.sdmp, K409476485-03032021000.pdf.exe, 00000003.00000003.343140401.0000000006007000.00000004.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.fontbureau.comaK409476485-03032021000.pdf.exe, 00000003.00000002.596348173.0000000006000000.00000004.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.fontbureau.comdK409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://en.wK409476485-03032021000.pdf.exe, 00000003.00000003.339668576.0000000006003000.00000004.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.carterandcone.comlK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                                            unknown
                                                            http://www.fontbureau.com/designers/cabarga.htmlNK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                                              high
                                                              http://www.founder.com.cn/cnK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.fontbureau.com/designers/frere-jones.htmlK409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                                                high
                                                                http://www.fontbureau.comoituK409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://ftp.triplelink.co.thK409476485-03032021000.pdf.exe, 00000003.00000002.591710521.000000000302E000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.fontbureau.com/designers$K409476485-03032021000.pdf.exe, 00000003.00000003.347391240.000000000600A000.00000004.00000001.sdmpfalse
                                                                  high
                                                                  http://www.jiyu-kobo.co.jp/K409476485-03032021000.pdf.exe, 00000003.00000003.344221992.000000000600A000.00000004.00000001.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  • URL Reputation: safe
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://www.fontbureau.com/designers8K409476485-03032021000.pdf.exe, 00000003.00000002.597348617.0000000007212000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    http://www.fontbureau.comFeK409476485-03032021000.pdf.exe, 00000003.00000003.345282412.000000000600A000.00000004.00000001.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://www.fontbureau.comalsK409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    • URL Reputation: safe
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.fontbureau.comalicK409476485-03032021000.pdf.exe, 00000003.00000003.348257540.000000000600D000.00000004.00000001.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    • URL Reputation: safe
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.jiyu-kobo.co.jp/-usXK409476485-03032021000.pdf.exe, 00000003.00000003.343783361.000000000600A000.00000004.00000001.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown

                                                                    Contacted IPs

                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs

                                                                    Public

                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    103.27.200.199
                                                                    unknownThailand
                                                                    58955BANGMODENTERPRISE-THBangmodEnterpriseCoLtdTHtrue

                                                                    General Information

                                                                    Joe Sandbox Version:31.0.0 Emerald
                                                                    Analysis ID:361816
                                                                    Start date:03.03.2021
                                                                    Start time:08:52:05
                                                                    Joe Sandbox Product:CloudBasic
                                                                    Overall analysis duration:0h 10m 5s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:light
                                                                    Sample file name:K409476485-03032021000.pdf.exe
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                    Number of analysed new started processes analysed:24
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • HDC enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Detection:MAL
                                                                    Classification:mal100.phis.troj.spyw.evad.winEXE@7/4@2/1
                                                                    EGA Information:Failed
                                                                    HDC Information:
                                                                    • Successful, ratio: 8.7% (good quality ratio 7.7%)
                                                                    • Quality average: 76.1%
                                                                    • Quality standard deviation: 33.1%
                                                                    HCA Information:
                                                                    • Successful, ratio: 96%
                                                                    • Number of executed functions: 0
                                                                    • Number of non-executed functions: 0
                                                                    Cookbook Comments:
                                                                    • Adjust boot time
                                                                    • Enable AMSI
                                                                    • Found application associated with file extension: .exe
                                                                    Warnings:
                                                                    Show All
                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                    • Excluded IPs from analysis (whitelisted): 13.64.90.137, 92.122.145.220, 104.43.193.48, 168.61.161.212, 52.147.198.201, 51.104.139.180, 52.155.217.156, 8.248.123.254, 8.248.131.254, 8.248.149.254, 67.26.139.254, 67.26.81.254, 20.54.26.129, 51.103.5.159, 23.32.238.200, 23.32.238.177, 184.30.24.56
                                                                    • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, vip1-par02p.wns.notify.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e12564.dspb.akamaiedge.net, wns.notify.trafficmanager.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                                                    Simulations

                                                                    Behavior and APIs

                                                                    TimeTypeDescription
                                                                    08:52:55API Interceptor6x Sleep call for process: K409476485-03032021000.pdf.exe modified

                                                                    Joe Sandbox View / Context

                                                                    IPs

                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                    103.27.200.199Vkdr225E85.exeGet hashmaliciousBrowse
                                                                      071020207659825.PDF.exeGet hashmaliciousBrowse
                                                                        file.exeGet hashmaliciousBrowse
                                                                          103002994-05102020.PDF.exeGet hashmaliciousBrowse
                                                                            1110975-0080620.PDF.exeGet hashmaliciousBrowse
                                                                              l0185766832020805.PDF.exeGet hashmaliciousBrowse
                                                                                008042020786544141.PDF.exeGet hashmaliciousBrowse
                                                                                  dHXjzn9Z5w.exeGet hashmaliciousBrowse
                                                                                    O7292020987725545.PDF.exeGet hashmaliciousBrowse
                                                                                      98764737722.PDF.exeGet hashmaliciousBrowse
                                                                                        gunzipped.exeGet hashmaliciousBrowse

                                                                                          Domains

                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                          ftp.triplelink.co.thVkdr225E85.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          071020207659825.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          file.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          103002994-05102020.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          1110975-0080620.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          l0185766832020805.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          008042020786544141.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          dHXjzn9Z5w.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          O7292020987725545.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          98764737722.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          gunzipped.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199

                                                                                          ASN

                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                          BANGMODENTERPRISE-THBangmodEnterpriseCoLtdTHVkdr225E85.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          WfSx9pJXxf.exeGet hashmaliciousBrowse
                                                                                          • 103.86.49.11
                                                                                          l9ZtB4c9Gj.exeGet hashmaliciousBrowse
                                                                                          • 103.86.49.11
                                                                                          New Purchase Order 501,689$.exeGet hashmaliciousBrowse
                                                                                          • 45.64.187.182
                                                                                          071020207659825.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          file.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          103002994-05102020.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          BAL_0MX2NTOGM6VL9.docGet hashmaliciousBrowse
                                                                                          • 45.64.185.141
                                                                                          1110975-0080620.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          l0185766832020805.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          008042020786544141.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          dHXjzn9Z5w.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          O7292020987725545.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          98764737722.PDF.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          gunzipped.exeGet hashmaliciousBrowse
                                                                                          • 103.27.200.199
                                                                                          Christmas Greeting eCard.docGet hashmaliciousBrowse
                                                                                          • 103.27.201.8
                                                                                          Christmas Greeting eCard.docGet hashmaliciousBrowse
                                                                                          • 103.27.201.8
                                                                                          Christmas Greeting eCard.docGet hashmaliciousBrowse
                                                                                          • 103.27.201.8
                                                                                          http://www.ragamjayakonveksi.com/LVOI-ciiP2TrcvEri2zr_NkaRtevhO-LxGet hashmaliciousBrowse
                                                                                          • 103.27.201.8
                                                                                          system.ps1Get hashmaliciousBrowse
                                                                                          • 103.27.200.95

                                                                                          JA3 Fingerprints

                                                                                          No context

                                                                                          Dropped Files

                                                                                          No context

                                                                                          Created / dropped Files

                                                                                          C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\K409476485-03032021000.pdf.exe.log
                                                                                          Process:C:\Users\user\Desktop\K409476485-03032021000.pdf.exe
                                                                                          File Type:ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):1314
                                                                                          Entropy (8bit):5.350128552078965
                                                                                          Encrypted:false
                                                                                          SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                                                          MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                                                          SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                                                          SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                                                          SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                                                          Malicious:true
                                                                                          Reputation:high, very likely benign file
                                                                                          Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                          C:\Users\user\AppData\Local\Temp\holderwb.txt
                                                                                          Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                          File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):2
                                                                                          Entropy (8bit):1.0
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:Qn:Qn
                                                                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                          Malicious:false
                                                                                          Reputation:high, very likely benign file
                                                                                          Preview: ..
                                                                                          C:\Users\user\AppData\Roaming\pid.txt
                                                                                          Process:C:\Users\user\Desktop\K409476485-03032021000.pdf.exe
                                                                                          File Type:ASCII text, with no line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):4
                                                                                          Entropy (8bit):1.5
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:mSXn:mSX
                                                                                          MD5:29E11EA8EC6C7804A7F939E8E78E9C18
                                                                                          SHA1:4A1AD6FFBE252DB7B267F82822EDEA047AE50814
                                                                                          SHA-256:FD088ACEB668709F9C385D5220AE2E8B8BF92E503366BBA906FC11B41C51F120
                                                                                          SHA-512:9EF035F7477BC3079268E205180A9D651FBA9903A2CD3D01638DDA85B67B5CEC396256B5B4C4351430D38A3C653C1D62FA34E3FDC60D58C7C142DB394989C01D
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview: 7072
                                                                                          C:\Users\user\AppData\Roaming\pidloc.txt
                                                                                          Process:C:\Users\user\Desktop\K409476485-03032021000.pdf.exe
                                                                                          File Type:ASCII text, with no line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):56
                                                                                          Entropy (8bit):4.578555923608794
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:oNN2+Wu3UIQr:oNN2RukIQr
                                                                                          MD5:AD0C7BB1B151D37D1E50EDEC35FDB1AC
                                                                                          SHA1:CFE4CA48A549A050F03A2700C87591AB80732D15
                                                                                          SHA-256:3E834C05B01D1B5E3822508120FC28E9AA3376C897BDC4777FF3EEF38433266B
                                                                                          SHA-512:C37A03A105F1FFFC2293BCF428A169BB44059EC2466C257EC4D9ED5C4F7FE0BA2F34372D976A47B8A89F7D8964E688CD6BED27F776D24FC0E93BDF2301ADF51F
                                                                                          Malicious:false
                                                                                          Reputation:low
                                                                                          Preview: C:\Users\user\Desktop\K409476485-03032021000.pdf.exe

                                                                                          Static File Info

                                                                                          General

                                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                          Entropy (8bit):7.660579517159115
                                                                                          TrID:
                                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                                          File name:K409476485-03032021000.pdf.exe
                                                                                          File size:1488384
                                                                                          MD5:88ff54784a623dcd43bb8c22491a5398
                                                                                          SHA1:873bb1426e0863be86a1df2d94ab33d8ac340d48
                                                                                          SHA256:93aacab7e09044795808ad1a0256c015271653ab0fe9d62785800c0f19ef1ad8
                                                                                          SHA512:7c8b75bbce1ebec485633b6b4d1e5e20cb295d0259e8d9fbd78c1ad72bb8bd2a7030cc517e12435d45cac144cf856bbaecb37a25e31f0157ddf1ca68af5074ef
                                                                                          SSDEEP:24576:UFzZuCFA6bbLJl/8mJ8yg1SJqy3ekImJFHYzEWLnKRWu3/bGa3m6B:MZun6nTTJ81QqcekR4FLKRtqW
                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....P...............P.............n.... ... ....@.. ....................................@................................

                                                                                          File Icon

                                                                                          Icon Hash:70cea2b7af8acc71

                                                                                          Static PE Info

                                                                                          General

                                                                                          Entrypoint:0x541d6e
                                                                                          Entrypoint Section:.text
                                                                                          Digitally signed:false
                                                                                          Imagebase:0x400000
                                                                                          Subsystem:windows gui
                                                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                          Time Stamp:0xC9509DF1 [Sun Jan 10 11:28:49 2077 UTC]
                                                                                          TLS Callbacks:
                                                                                          CLR (.Net) Version:v4.0.30319
                                                                                          OS Version Major:4
                                                                                          OS Version Minor:0
                                                                                          File Version Major:4
                                                                                          File Version Minor:0
                                                                                          Subsystem Version Major:4
                                                                                          Subsystem Version Minor:0
                                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                          Entrypoint Preview

                                                                                          Instruction
                                                                                          jmp dword ptr [00402000h]
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al
                                                                                          add byte ptr [eax], al

                                                                                          Data Directories

                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x141d180x53.text
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1420000x2b340.rsrc
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x16e0000xc.reloc
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                          Sections

                                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          .text0x20000x13fd740x13fe00False0.864498613961data7.86302896001IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                          .rsrc0x1420000x2b3400x2b400False0.179439125723data4.11141975026IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .reloc0x16e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                          Resources

                                                                                          NameRVASizeTypeLanguageCountry
                                                                                          RT_ICON0x1422b00x32a2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                                                          RT_ICON0x1455540x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                                                                          RT_ICON0x155d7c0x94a8data
                                                                                          RT_ICON0x15f2240x5488data
                                                                                          RT_ICON0x1646ac0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 16580607, next used block 4294917888
                                                                                          RT_ICON0x1688d40x25a8data
                                                                                          RT_ICON0x16ae7c0x10a8data
                                                                                          RT_ICON0x16bf240x988data
                                                                                          RT_ICON0x16c8ac0x468GLS_BINARY_LSB_FIRST
                                                                                          RT_GROUP_ICON0x16cd140x84data
                                                                                          RT_VERSION0x16cd980x3b6data
                                                                                          RT_MANIFEST0x16d1500x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                          Imports

                                                                                          DLLImport
                                                                                          mscoree.dll_CorExeMain

                                                                                          Version Infos

                                                                                          DescriptionData
                                                                                          Translation0x0000 0x04b0
                                                                                          LegalCopyrightCopyright 2019 RestOBar
                                                                                          Assembly Version1.0.0.16
                                                                                          InternalNameCallerLineNumberAttribute.exe
                                                                                          FileVersion1.0.0.16
                                                                                          CompanyNameRestOBar
                                                                                          LegalTrademarksRestOBar
                                                                                          CommentsRestaurant
                                                                                          ProductNameRestaurant
                                                                                          ProductVersion1.0.0.16
                                                                                          FileDescriptionRestaurant
                                                                                          OriginalFilenameCallerLineNumberAttribute.exe

                                                                                          Network Behavior

                                                                                          Snort IDS Alerts

                                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                          03/03/21-08:53:27.833860TCP2020410ET TROJAN HawkEye Keylogger FTP4973021192.168.2.6103.27.200.199

                                                                                          Network Port Distribution

                                                                                          TCP Packets

                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Mar 3, 2021 08:53:25.511143923 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:25.768407106 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:25.768516064 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:26.024404049 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:26.029043913 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:26.283080101 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:26.283102036 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:26.283890009 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:26.551301003 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:26.551800013 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:26.806021929 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:26.806672096 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:27.060749054 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:27.064647913 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:27.319814920 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:27.322906017 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:27.579214096 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:27.583668947 CET4973135243192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:27.626351118 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:27.833517075 CET3524349731103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:27.833672047 CET4973135243192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:27.833859921 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:28.087717056 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:28.088093042 CET4973135243192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:28.090018034 CET4973135243192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:28.090862989 CET4973135243192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:28.142040968 CET4973021192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:28.336878061 CET3524349731103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:28.339658022 CET3524349731103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:28.339675903 CET3524349731103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:28.340658903 CET3524349731103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:28.340770006 CET4973135243192.168.2.6103.27.200.199
                                                                                          Mar 3, 2021 08:53:28.341207981 CET2149730103.27.200.199192.168.2.6
                                                                                          Mar 3, 2021 08:53:28.392086029 CET4973021192.168.2.6103.27.200.199

                                                                                          UDP Packets

                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Mar 3, 2021 08:52:47.009809971 CET6204453192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:47.058520079 CET53620448.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:52:47.134437084 CET6379153192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:47.193731070 CET53637918.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:52:48.458002090 CET6426753192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:48.512262106 CET53642678.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:52:49.502476931 CET4944853192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:49.551578045 CET53494488.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:52:50.841274023 CET6034253192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:50.890105963 CET53603428.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:52:51.877044916 CET6134653192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:51.922832012 CET53613468.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:52:52.771096945 CET5177453192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:52.819791079 CET53517748.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:52:54.115677118 CET5602353192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:54.161587954 CET53560238.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:52:57.240307093 CET5838453192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:57.286458015 CET53583848.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:52:58.290936947 CET6026153192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:58.337307930 CET53602618.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:52:59.471559048 CET5606153192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:52:59.520106077 CET53560618.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:00.755563021 CET5833653192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:00.803951979 CET53583368.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:01.939369917 CET5378153192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:01.985307932 CET53537818.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:02.895586967 CET5406453192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:02.941308022 CET53540648.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:04.090280056 CET5281153192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:04.140978098 CET53528118.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:05.092434883 CET5529953192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:05.141144037 CET53552998.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:06.039613008 CET6374553192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:06.087435961 CET53637458.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:07.282989979 CET5005553192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:07.328859091 CET53500558.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:12.191803932 CET6137453192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:12.240031004 CET53613748.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:21.356158972 CET5033953192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:21.402004957 CET53503398.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:25.110963106 CET6330753192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:25.493843079 CET53633078.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:39.976706028 CET4969453192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:40.025732994 CET53496948.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:40.614722967 CET5498253192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:40.872507095 CET53549828.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:41.273473978 CET5001053192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:41.297663927 CET6371853192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:41.321671009 CET53500108.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:41.381864071 CET53637188.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:41.482259989 CET6211653192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:41.536712885 CET53621168.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:41.844165087 CET6381653192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:41.926184893 CET53638168.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:42.446228981 CET5501453192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:42.492760897 CET53550148.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:42.780477047 CET6220853192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:42.835248947 CET53622088.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:43.062160015 CET5757453192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:43.119256020 CET53575748.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:44.704943895 CET5181853192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:44.759002924 CET53518188.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:45.448537111 CET5662853192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:45.500353098 CET53566288.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:46.278848886 CET6077853192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:46.327862978 CET53607788.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:47.103584051 CET5379953192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:47.149806976 CET53537998.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:53:48.647473097 CET5468353192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:53:48.705815077 CET53546838.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:54:19.497776985 CET5932953192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:54:19.545166016 CET53593298.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:54:19.932460070 CET6402153192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:54:19.986515045 CET53640218.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:54:26.263832092 CET5612953192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:54:26.314650059 CET53561298.8.8.8192.168.2.6
                                                                                          Mar 3, 2021 08:54:43.770101070 CET5817753192.168.2.68.8.8.8
                                                                                          Mar 3, 2021 08:54:43.815763950 CET53581778.8.8.8192.168.2.6

                                                                                          DNS Queries

                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                          Mar 3, 2021 08:53:12.191803932 CET192.168.2.68.8.8.80x47b7Standard query (0)10.76.9.0.in-addr.arpaPTR (Pointer record)IN (0x0001)
                                                                                          Mar 3, 2021 08:53:25.110963106 CET192.168.2.68.8.8.80x54d8Standard query (0)ftp.triplelink.co.thA (IP address)IN (0x0001)

                                                                                          DNS Answers

                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                          Mar 3, 2021 08:53:12.240031004 CET8.8.8.8192.168.2.60x47b7Name error (3)10.76.9.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)
                                                                                          Mar 3, 2021 08:53:25.493843079 CET8.8.8.8192.168.2.60x54d8No error (0)ftp.triplelink.co.th103.27.200.199A (IP address)IN (0x0001)

                                                                                          FTP Packets

                                                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                                                          Mar 3, 2021 08:53:26.024404049 CET2149730103.27.200.199192.168.2.6220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 8 of 50 allowed.
                                                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 8 of 50 allowed.220-Local time is now 14:49. Server port: 21.
                                                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 8 of 50 allowed.220-Local time is now 14:49. Server port: 21.220-This is a private system - No anonymous login
                                                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 8 of 50 allowed.220-Local time is now 14:49. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 8 of 50 allowed.220-Local time is now 14:49. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                                                          Mar 3, 2021 08:53:26.029043913 CET4973021192.168.2.6103.27.200.199USER Loggsszzzxxx@triplelink.co.th
                                                                                          Mar 3, 2021 08:53:26.283102036 CET2149730103.27.200.199192.168.2.6331 User Loggsszzzxxx@triplelink.co.th OK. Password required
                                                                                          Mar 3, 2021 08:53:26.283890009 CET4973021192.168.2.6103.27.200.199PASS xpen2000
                                                                                          Mar 3, 2021 08:53:26.551301003 CET2149730103.27.200.199192.168.2.6230-This server supports FXP transfers
                                                                                          230-This server supports FXP transfers230 OK. Current restricted directory is /
                                                                                          Mar 3, 2021 08:53:26.806021929 CET2149730103.27.200.199192.168.2.6504 Unknown command
                                                                                          Mar 3, 2021 08:53:26.806672096 CET4973021192.168.2.6103.27.200.199PWD
                                                                                          Mar 3, 2021 08:53:27.060749054 CET2149730103.27.200.199192.168.2.6257 "/" is your current location
                                                                                          Mar 3, 2021 08:53:27.064647913 CET4973021192.168.2.6103.27.200.199TYPE I
                                                                                          Mar 3, 2021 08:53:27.319814920 CET2149730103.27.200.199192.168.2.6200 TYPE is now 8-bit binary
                                                                                          Mar 3, 2021 08:53:27.322906017 CET4973021192.168.2.6103.27.200.199PASV
                                                                                          Mar 3, 2021 08:53:27.579214096 CET2149730103.27.200.199192.168.2.6227 Entering Passive Mode (103,27,200,199,137,171)
                                                                                          Mar 3, 2021 08:53:27.833859921 CET4973021192.168.2.6103.27.200.199STOR HawkEye_Keylogger_Stealer_Records_609290 3.3.2021 9:01:04 AM.txt
                                                                                          Mar 3, 2021 08:53:28.087717056 CET2149730103.27.200.199192.168.2.6150 Accepted data connection
                                                                                          Mar 3, 2021 08:53:28.341207981 CET2149730103.27.200.199192.168.2.6226-File successfully transferred
                                                                                          226-File successfully transferred226 0.253 seconds (measured here), 5.89 Kbytes per second

                                                                                          Code Manipulations

                                                                                          Statistics

                                                                                          Behavior

                                                                                          Click to jump to process

                                                                                          System Behavior

                                                                                          General

                                                                                          Start time:08:52:54
                                                                                          Start date:03/03/2021
                                                                                          Path:C:\Users\user\Desktop\K409476485-03032021000.pdf.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:'C:\Users\user\Desktop\K409476485-03032021000.pdf.exe'
                                                                                          Imagebase:0x260000
                                                                                          File size:1488384 bytes
                                                                                          MD5 hash:88FF54784A623DCD43BB8C22491A5398
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:.Net C# or VB.NET
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.334914842.00000000027E4000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                          • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000001.00000002.336336777.0000000003FD9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                          Reputation:low

                                                                                          General

                                                                                          Start time:08:52:56
                                                                                          Start date:03/03/2021
                                                                                          Path:C:\Users\user\Desktop\K409476485-03032021000.pdf.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Users\user\Desktop\K409476485-03032021000.pdf.exe
                                                                                          Imagebase:0x970000
                                                                                          File size:1488384 bytes
                                                                                          MD5 hash:88FF54784A623DCD43BB8C22491A5398
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:.Net C# or VB.NET
                                                                                          Yara matches:
                                                                                          • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                                                          • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000003.00000002.589139096.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                          • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000003.00000002.590874619.0000000002D71000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                          • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 00000003.00000002.598275210.0000000007D30000.00000004.00000001.sdmp, Author: Arnim Rupp
                                                                                          • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000003.00000002.593126682.0000000003D71000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000003.00000002.593126682.0000000003D71000.00000004.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 00000003.00000002.598580548.00000000085C0000.00000004.00000001.sdmp, Author: Arnim Rupp
                                                                                          Reputation:low

                                                                                          General

                                                                                          Start time:08:53:17
                                                                                          Start date:03/03/2021
                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                                                                                          Imagebase:0x400000
                                                                                          File size:1171592 bytes
                                                                                          MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000006.00000002.375467780.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          General

                                                                                          Start time:08:53:17
                                                                                          Start date:03/03/2021
                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                                                                                          Imagebase:0x400000
                                                                                          File size:1171592 bytes
                                                                                          MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000007.00000002.378872120.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          Disassembly

                                                                                          Code Analysis

                                                                                          Reset < >