Loading ...

Play interactive tourEdit tour

Analysis Report 5O857649056366403032021.PDF.exe

Overview

General Information

Sample Name:5O857649056366403032021.PDF.exe
Analysis ID:362120
MD5:a67f05d542bcee462ecc03ae4d8195d6
SHA1:eeb590aaa3c47851ae6f678c29aec2ba1b54df8f
SHA256:1e96629ba4b537932150cc517455a0cfddcb7c35a4a0998d107643dc887b31c3
Infos:

Most interesting Screenshot:

Detection

HawkEye MailPassView
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected HawkEye Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension
Yara detected AntiVM_3
Yara detected HawkEye Keylogger
Yara detected MailPassView
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Opens the same file many times (likely Sandbox evasion)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Uses an obfuscated file name to hide its real file extension (double extension)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • 5O857649056366403032021.PDF.exe (PID: 3468 cmdline: 'C:\Users\user\Desktop\5O857649056366403032021.PDF.exe' MD5: A67F05D542BCEE462ECC03AE4D8195D6)
    • 5O857649056366403032021.PDF.exe (PID: 5444 cmdline: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe MD5: A67F05D542BCEE462ECC03AE4D8195D6)
      • vbc.exe (PID: 6732 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
        • WerFault.exe (PID: 6844 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6732 -s 516 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • vbc.exe (PID: 6724 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt' MD5: C63ED21D5706A527419C9FBD730FFB2E)
  • cleanup

Malware Configuration

Threatname: HawkEye

{"Modules": ["mailpv", "WebBrowserPassView", "Mail PassView"], "Version": ""}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000002.00000002.784876138.0000000008720000.00000004.00000001.sdmpHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
    • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
    00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpRAT_HawkEyeDetects HawkEye RATKevin Breen <kevin@techanarchy.net>
    • 0x7b719:$key: HawkEyeKeylogger
    • 0x7d917:$salt: 099u787978786
    • 0x7bd32:$string1: HawkEye_Keylogger
    • 0x7cb85:$string1: HawkEye_Keylogger
    • 0x7d877:$string1: HawkEye_Keylogger
    • 0x7c11b:$string2: holdermail.txt
    • 0x7c13b:$string2: holdermail.txt
    • 0x7c05d:$string3: wallet.dat
    • 0x7c075:$string3: wallet.dat
    • 0x7c08b:$string3: wallet.dat
    • 0x7d459:$string4: Keylog Records
    • 0x7d771:$string4: Keylog Records
    • 0x7d96f:$string5: do not script -->
    • 0x7b701:$string6: \pidloc.txt
    • 0x7b767:$string7: BSPLIT
    • 0x7b777:$string7: BSPLIT
    00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
      00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpJoeSecurity_HawkEyeYara detected HawkEye KeyloggerJoe Security
        Click to see the 23 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        8.2.vbc.exe.400000.0.raw.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
          2.2.5O857649056366403032021.PDF.exe.8890000.12.raw.unpackHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
          • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
          2.2.5O857649056366403032021.PDF.exe.8720000.11.raw.unpackHKTL_NET_GUID_StealerDetects c# red/black-team tools via typelibguidArnim Rupp
          • 0x101b:$typelibguid0: 8fcd4931-91a2-4e18-849b-70de34ab75df
          2.2.5O857649056366403032021.PDF.exe.41a9930.7.raw.unpackJoeSecurity_MailPassViewYara detected MailPassViewJoe Security
            2.2.5O857649056366403032021.PDF.exe.41a9930.7.raw.unpackJoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
              Click to see the 58 entries

              Sigma Overview

              System Summary:

              barindex
              Sigma detected: Suspicious Double ExtensionShow sources
              Source: Process startedAuthor: Florian Roth (rule), @blu3_team (idea): Data: Command: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe, CommandLine: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe, NewProcessName: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe, OriginalFileName: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe, ParentCommandLine: 'C:\Users\user\Desktop\5O857649056366403032021.PDF.exe' , ParentImage: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe, ParentProcessId: 3468, ProcessCommandLine: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe, ProcessId: 5444

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: 5O857649056366403032021.PDF.exe.5444.2.memstrMalware Configuration Extractor: HawkEye {"Modules": ["mailpv", "WebBrowserPassView", "Mail PassView"], "Version": ""}
              Multi AV Scanner detection for submitted fileShow sources
              Source: 5O857649056366403032021.PDF.exeReversingLabs: Detection: 23%
              Machine Learning detection for sampleShow sources
              Source: 5O857649056366403032021.PDF.exeJoe Sandbox ML: detected
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpackAvira: Label: TR/AD.MExecute.lzrac
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpackAvira: Label: SPR/Tool.MailPassView.473
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpackAvira: Label: TR/Inject.vcoldi

              Compliance:

              barindex
              Uses 32bit PE filesShow sources
              Source: 5O857649056366403032021.PDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
              Source: 5O857649056366403032021.PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Binary contains paths to debug symbolsShow sources
              Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmp
              Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exe
              Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exe
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmpBinary or memory string: autorun.inf
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmpBinary or memory string: [autorun]
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpBinary or memory string: autorun.inf
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpBinary or memory string: [autorun]
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
              Source: unknownDNS traffic detected: query: 203.215.12.0.in-addr.arpa replaycode: Name error (3)
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exe, 00000007.00000002.275551658.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exe, 00000007.00000002.275551658.0000000000400000.00000040.00000001.sdmpString found in binary or memory: @nss3.dllSOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\seamonkey.exe%programfiles%\Sea MonkeySOFTWARE\Mozillamozilla%s\binPathToExe%programfiles%\Mozilla FirefoxSELECT id, hostname, httpRealm, formSubmitURL, usernameField, passwordField, encryptedUsername, encryptedPassword FROM moz_logins.---signons.txtsignons2.txtsignons3.txtsignons.sqlitenetmsg.dllUnknown Error\Error %d: %seditkernel32.dll... open %2.2X %s (%s)Microsoft_WinInetMicrosoft_WinInet_u7@dllhost.exetaskhost.exetaskhostex.exebhvContainersContainerIdNameHistoryContainer_%I64dAccessCountCreationTimeExpiryTimeAccessedTimeModifiedTimeUrlEntryIDvisited:Microsoft\Windows\WebCache\WebCacheV01.datMicrosoft\Windows\WebCache\WebCacheV24.dat0123456789ABCDEFURL index.datSoftware\Microsoft\Internet Explorer\IntelliForms\Storage2https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
              Source: vbc.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: unknownDNS traffic detected: queries for: 203.215.12.0.in-addr.arpa
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224554700.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://en.w
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpString found in binary or memory: http://whatismyipaddress.com/-
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.243737730.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.agfamonotype.0
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000003.224185573.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.223882735.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com/
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224185573.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC/
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC1
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224554700.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comTC3
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comadeh
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224323142.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comark
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224554700.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comb
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.227770906.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comf
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comghtv
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224554700.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comht
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comies
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comitk
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.commpa
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comsof
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000003.243602370.0000000006268000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000003.243672472.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.229567284.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.229591196.0000000006278000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/O
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.231534012.0000000006268000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.231609808.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers:
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.232516116.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersW
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.232557212.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersr
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.233214847.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designerst
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.772908055.00000000014F7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.coma
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.772908055.00000000014F7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comceTF
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.772908055.00000000014F7000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.come.com
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.222841537.000000000626E000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.223199362.0000000006265000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn&
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.223388192.0000000006265000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/X
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.222841537.000000000626E000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnO
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.223199362.0000000006265000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnr-c
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.235768370.0000000006278000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.235768370.0000000006278000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/9
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.236539415.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmR
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000003.222340087.000000000626E000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.222340087.000000000626E000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.krF
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.222340087.000000000626E000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.krny
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.238156321.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.234952955.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.-
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.240555318.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.monotype.t
              Source: vbc.exe, vbc.exe, 00000008.00000002.262898420.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.227490771.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.227490771.0000000006268000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com8
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.222273989.000000000626E000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.222652479.000000000626E000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krn
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000003.222340087.000000000626E000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krn-u
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmpString found in binary or memory: http://www.site.com/logs.php
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: vbc.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css
              Source: vbc.exeString found in binary or memory: https://www.google.com/accounts/servicelogin

              Key, Mouse, Clipboard, Microphone and Screen Capturing:

              barindex
              Yara detected HawkEye KeyloggerShow sources
              Source: Yara matchFile source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 5444, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 3468, type: MEMORY
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.408208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.45fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.409c0d.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3a73b90.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.387bbb0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.31cb310.6.raw.unpack, type: UNPACKEDPE
              Contains functionality to log keystrokes (.Net Source)Show sources
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.cs.Net Code: HookKeyboard
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040D674 OpenClipboard,GetLastError,DeleteFileW,

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 2.2.5O857649056366403032021.PDF.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 2.2.5O857649056366403032021.PDF.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 2.2.5O857649056366403032021.PDF.exe.45fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 2.2.5O857649056366403032021.PDF.exe.45fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 2.2.5O857649056366403032021.PDF.exe.409c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 2.2.5O857649056366403032021.PDF.exe.409c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.5O857649056366403032021.PDF.exe.3a73b90.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.5O857649056366403032021.PDF.exe.3a73b90.3.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.5O857649056366403032021.PDF.exe.387bbb0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects HawkEye RAT Author: Kevin Breen <kevin@techanarchy.net>
              Source: 0.2.5O857649056366403032021.PDF.exe.387bbb0.4.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Source: 2.2.5O857649056366403032021.PDF.exe.31cb310.6.raw.unpack, type: UNPACKEDPEMatched rule: detect HawkEye in memory Author: JPCERT/CC Incident Response Group
              Initial sample is a PE file and has a suspicious nameShow sources
              Source: initial sampleStatic PE information: Filename: 5O857649056366403032021.PDF.exe
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess Stats: CPU usage > 98%
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 0_2_0267E330
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 0_2_0267C690
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 0_2_02679D78
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_0151B29C
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_0151C310
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_0151B290
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_015199D0
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_0151DFD0
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_073DB4E0
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_073DEEC8
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_073DBDB0
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_073DB198
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_073D0006
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00404419
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00404516
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00413538
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004145A1
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0040E639
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004337AF
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004399B1
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0043DAE7
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00405CF6
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00403F85
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00411F99
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00404DDB
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_0040BD8A
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00404E4C
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00404EBD
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00404F4E
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413F8E appears 66 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00413E2D appears 34 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00442A90 appears 36 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 004141D6 appears 88 times
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: String function: 00411538 appears 35 times
              Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6732 -s 516
              Source: 5O857649056366403032021.PDF.exeBinary or memory string: OriginalFilename vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.223255879.0000000005980000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLegacyPathHandling.dllN vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAsyncState.dllF vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePhulli.exe0 vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000000.210356525.0000000000342000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameNotSupportedException.exe6 vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exeBinary or memory string: OriginalFilename vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000000.216226088.0000000000CA2000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameNotSupportedException.exe6 vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCMemoryExecute.dll@ vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameWebBrowserPassView.exeF vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamemailpv.exe< vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.768924491.0000000000482000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamePhulli.exe0 vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exeBinary or memory string: OriginalFilenameNotSupportedException.exe6 vs 5O857649056366403032021.PDF.exe
              Source: 5O857649056366403032021.PDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 00000002.00000002.784876138.0000000008720000.00000004.00000001.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 00000002.00000002.785047145.0000000008890000.00000004.00000001.sdmp, type: MEMORYMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 2.2.5O857649056366403032021.PDF.exe.8890000.12.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.5O857649056366403032021.PDF.exe.8720000.11.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 2.2.5O857649056366403032021.PDF.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.5O857649056366403032021.PDF.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 2.2.5O857649056366403032021.PDF.exe.408208.2.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 2.2.5O857649056366403032021.PDF.exe.45fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 2.2.5O857649056366403032021.PDF.exe.45fa72.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 2.2.5O857649056366403032021.PDF.exe.409c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 2.2.5O857649056366403032021.PDF.exe.409c0d.1.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.5O857649056366403032021.PDF.exe.3a73b90.3.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.5O857649056366403032021.PDF.exe.3a73b90.3.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 0.2.5O857649056366403032021.PDF.exe.3a73b90.3.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.5O857649056366403032021.PDF.exe.387bbb0.4.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 0.2.5O857649056366403032021.PDF.exe.387bbb0.4.raw.unpack, type: UNPACKEDPEMatched rule: RAT_HawkEye date = 01.06.2015, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = KeyLogger, description = Detects HawkEye RAT, reference = http://malwareconfig.com/stats/HawkEye
              Source: 0.2.5O857649056366403032021.PDF.exe.387bbb0.4.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 2.2.5O857649056366403032021.PDF.exe.31cb310.6.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 2.2.5O857649056366403032021.PDF.exe.31cb310.6.raw.unpack, type: UNPACKEDPEMatched rule: Hawkeye author = JPCERT/CC Incident Response Group, description = detect HawkEye in memory, rule_usage = memory scan, reference = internal research
              Source: 2.2.5O857649056366403032021.PDF.exe.31def9c.5.raw.unpack, type: UNPACKEDPEMatched rule: HKTL_NET_GUID_Stealer date = 2020-12-29, author = Arnim Rupp, description = Detects c# red/black-team tools via typelibguid, reference = https://github.com/malwares/Stealer, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 5O857649056366403032021.PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.csCryptographic APIs: 'CreateDecryptor'
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.csBase64 encoded string: 'xZv2KTjDOGwMPewlL06/2/+cBh+3YNzZLNYqWwxyouAodILYLJV9xZ9CGhDaO0jH', 'G9O9EXxYbTKbu/JIqZ4FXWAEsGCT7RJ+/SHmPiE44HoRMOAUDNTRY4dL0xxXj+PX', 'yFzOCZnSHgqZgbtRiX7zTTL1Qt6D+8cCFAWN8MP9eKKls7OaJo1TF2n4j++JkQX9', 'O6ZQ7J5ocLxf6RhQQpNSk/JzuZPUi9E0JuztOnaE/Qd705fOtAkyZW1GYthg8J6YkNuszS5M9pYlCk2wrogMRg==', 'PN4TW3peZ3UeXi7asDB56E4dMEf6JrdkxXNUlrUjLlWcjHK1wZ5CpLZZKB/ocuFWy9Kw0Q8tIc1Qv7OEgqzD+w=='
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@8/7@1/1
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00415AFD GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00415F87 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00411196 CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,free,Process32NextW,CloseHandle,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00411EF8 FindResourceW,SizeofResource,LoadResource,LockResource,
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5O857649056366403032021.PDF.exe.logJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6732
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\holdermail.txtJump to behavior
              Source: 5O857649056366403032021.PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exe, 00000007.00000002.275551658.0000000000400000.00000040.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpBinary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade);
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpBinary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone);
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: 5O857649056366403032021.PDF.exeReversingLabs: Detection: 23%
              Source: unknownProcess created: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe 'C:\Users\user\Desktop\5O857649056366403032021.PDF.exe'
              Source: unknownProcess created: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe C:\Users\user\Desktop\5O857649056366403032021.PDF.exe
              Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
              Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
              Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6732 -s 516
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess created: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe C:\Users\user\Desktop\5O857649056366403032021.PDF.exe
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
              Source: 5O857649056366403032021.PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: 5O857649056366403032021.PDF.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: 5O857649056366403032021.PDF.exeStatic file information: File size 1057280 > 1048576
              Source: 5O857649056366403032021.PDF.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x101800
              Source: 5O857649056366403032021.PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: C:\Users\Jovan\Documents\Visual Studio 2010\Projects\Stealer\CMemoryExecute\CMemoryExecute\obj\Release\CMemoryExecute.pdb source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmp
              Source: Binary string: f:\Projects\VS2005\mailpv\Release\mailpv.pdb source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exe
              Source: Binary string: f:\Projects\VS2005\WebBrowserPassView\Release\WebBrowserPassView.pdb source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, vbc.exe

              Data Obfuscation:

              barindex
              .NET source code contains potential unpackerShow sources
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.cs.Net Code: IsDotNet System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.cs.Net Code: run System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.cs.Net Code: stealMail System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.cs.Net Code: stealWebroswers System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004121C3 LoadLibraryW,GetProcAddress,
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 0_2_0267881C push 5F5E5B6Bh; ret
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 2_2_0151E672 push esp; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00442871 push ecx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00442A90 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00442A90 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00446E54 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00411879 push ecx; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_004118A0 push eax; ret
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_004118A0 push eax; ret
              Source: initial sampleStatic PE information: section name: .text entropy: 7.64304839327

              Hooking and other Techniques for Hiding and Protection:

              barindex
              Changes the view of files in windows explorer (hidden files and folders)Show sources
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced HiddenJump to behavior
              Uses an obfuscated file name to hide its real file extension (double extension)Show sources
              Source: Possible double extension: pdf.exeStatic PE information: 5O857649056366403032021.PDF.exe
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00441975 memset,wcscpy,memset,wcscpy,wcscat,wcscpy,wcscat,wcscpy,wcscat,GetModuleHandleW,LoadLibraryExW,LoadLibraryW,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion:

              barindex
              Yara detected AntiVM_3Show sources
              Source: Yara matchFile source: 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 3468, type: MEMORY
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.2804130.1.raw.unpack, type: UNPACKEDPE
              Opens the same file many times (likely Sandbox evasion)Show sources
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeFile opened: C:\Users\user\AppData\Local\Temp\holderwb.txt count: 306885
              Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeCode function: 0_2_003448FF sldt word ptr [eax]
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeThread delayed: delay time: 180000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe TID: 2168Thread sleep time: -100483s >= -30000s
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe TID: 4228Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe TID: 4952Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe TID: 6540Thread sleep time: -120000s >= -30000s
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe TID: 6544Thread sleep time: -140000s >= -30000s
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe TID: 6928Thread sleep time: -180000s >= -30000s
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00408441 FindFirstFileW,FindNextFileW,wcslen,wcslen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00407E0E FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_00406EC3 FindFirstFileA,FindNextFileA,strlen,strlen,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004161B0 memset,GetSystemInfo,
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpBinary or memory string: vmware
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess information queried: ProcessInformation
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeProcess queried: DebugPort
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_004121C3 LoadLibraryW,GetProcAddress,
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              .NET source code references suspicious native API functionsShow sources
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, Form1.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
              Source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, RunPE.csReference to suspicious API methods: ('ReadProcessMemory', 'ReadProcessMemory@kernel32'), ('WriteProcessMemory', 'WriteProcessMemory@kernel32'), ('VirtualProtectEx', 'VirtualProtectEx@kernel32'), ('VirtualAllocEx', 'VirtualAllocEx@kernel32')
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000 value starts with: 4D5A
              Sample uses process hollowing techniqueShow sources
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base address: 400000
              Writes to foreign memory regionsShow sources
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 412000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 416000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 418000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 400000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 401000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 443000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 44F000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe base: 452000
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess created: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe C:\Users\user\Desktop\5O857649056366403032021.PDF.exe
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.773337161.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: Program Manager
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.773337161.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.773337161.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: Progman
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.773337161.0000000001AC0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_0041604B GetSystemTime,memcpy,GetCurrentProcessId,memcpy,GetTickCount,memcpy,QueryPerformanceCounter,memcpy,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 8_2_0040724C memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: 7_2_00407674 GetVersionExW,
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
              Source: C:\Users\user\Desktop\5O857649056366403032021.PDF.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

              Stealing of Sensitive Information:

              barindex
              Yara detected HawkEye KeyloggerShow sources
              Source: Yara matchFile source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 5444, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 3468, type: MEMORY
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.408208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.45fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.409c0d.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3a73b90.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.387bbb0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.31cb310.6.raw.unpack, type: UNPACKEDPE
              Yara detected MailPassViewShow sources
              Source: Yara matchFile source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.262898420.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.778097540.00000000041A9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 5444, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 3468, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6724, type: MEMORY
              Source: Yara matchFile source: 8.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.41a9930.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 8.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.45fa72.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.408208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.45fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.41a9930.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.409c0d.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3a73b90.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.387bbb0.4.raw.unpack, type: UNPACKEDPE
              Tries to steal Instant Messenger accounts or passwordsShow sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Dynamic Salt
              Tries to steal Mail credentials (via file access)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
              Tries to steal Mail credentials (via file registry)Show sources
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, PopPassword
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: strcpy,strcpy,strcpy,strcpy,RegCloseKey, SMTPPassword
              Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeCode function: ESMTPPassword
              Yara detected WebBrowserPassView password recovery toolShow sources
              Source: Yara matchFile source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.275551658.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.778097540.00000000041A9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 5444, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 6732, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 3468, type: MEMORY
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.41a9930.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vbc.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.409c0d.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.41c1b50.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vbc.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.408208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.41c1b50.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.409c0d.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3a73b90.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.387bbb0.4.raw.unpack, type: UNPACKEDPE

              Remote Access Functionality:

              barindex
              Detected HawkEye RatShow sources
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
              Source: 5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmpString found in binary or memory: HawkEyeKeylogger
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmpString found in binary or memory: l&HawkEye_Keylogger_Execution_Confirmed_
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmpString found in binary or memory: l"HawkEye_Keylogger_Stealer_Records_
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpString found in binary or memory: \pidloc.txt!HawkEyeKeylogger
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpString found in binary or memory: Installed Firewall: MHawkEye_Keylogger_Execution_Confirmed_.txtUHawkEye Keylogger | Execution Confirmed |
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpString found in binary or memory: ==============================================EHawkEye_Keylogger_Stealer_Records_MHawkEye Keylogger | Stealer Records |
              Source: 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpString found in binary or memory: .jpegCHawkEye_Keylogger_Keylog_Records_
              Yara detected HawkEye KeyloggerShow sources
              Source: Yara matchFile source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 5444, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 5O857649056366403032021.PDF.exe PID: 3468, type: MEMORY
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.408208.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.45fa72.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3c22610.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.409c0d.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.3a73b90.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.5O857649056366403032021.PDF.exe.387bbb0.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.5O857649056366403032021.PDF.exe.31cb310.6.raw.unpack, type: UNPACKEDPE

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Replication Through Removable Media1Windows Management Instrumentation1Application Shimming1Application Shimming1Disable or Modify Tools1Input Capture1System Time Discovery1Replication Through Removable Media1Archive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsNative API11Boot or Logon Initialization ScriptsProcess Injection312Deobfuscate/Decode Files or Information11Credentials in Registry2Peripheral Device Discovery1Remote Desktop ProtocolEmail Collection1Exfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsShared Modules1Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information141Credentials In Files1Account Discovery1SMB/Windows Admin SharesInput Capture1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing13NTDSFile and Directory Discovery1Distributed Component Object ModelClipboard Data1Scheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading11LSA SecretsSystem Information Discovery17SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion14Cached Domain CredentialsSecurity Software Discovery121VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection312DCSyncVirtualization/Sandbox Evasion14Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemProcess Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

              Behavior Graph

              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              5O857649056366403032021.PDF.exe24%ReversingLabsWin32.Trojan.AgentTesla
              5O857649056366403032021.PDF.exe100%Joe Sandbox ML

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              7.2.vbc.exe.400000.0.unpack100%AviraHEUR/AGEN.1125438Download File
              2.2.5O857649056366403032021.PDF.exe.400000.0.unpack100%AviraTR/AD.MExecute.lzracDownload File
              2.2.5O857649056366403032021.PDF.exe.400000.0.unpack100%AviraSPR/Tool.MailPassView.473Download File
              0.2.5O857649056366403032021.PDF.exe.3c22610.5.unpack100%AviraTR/Inject.vcoldiDownload File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              http://www.founder.com.cn/cnO0%Avira URL Cloudsafe
              http://www.carterandcone.comadeh0%Avira URL Cloudsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.carterandcone.com/0%Avira URL Cloudsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.carterandcone.com0%URL Reputationsafe
              http://www.carterandcone.com0%URL Reputationsafe
              http://www.carterandcone.com0%URL Reputationsafe
              http://www.fontbureau.comceTF0%Avira URL Cloudsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.founder.com.cn/cnr-c0%Avira URL Cloudsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://www.monotype.t0%Avira URL Cloudsafe
              http://www.founder.com.cn/cn/X0%Avira URL Cloudsafe
              http://www.carterandcone.comht0%Avira URL Cloudsafe
              http://www.carterandcone.comTC10%Avira URL Cloudsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.carterandcone.comTC/0%Avira URL Cloudsafe
              http://www.carterandcone.comitk0%Avira URL Cloudsafe
              http://www.goodfont.co.krny0%Avira URL Cloudsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.carterandcone.comTC30%Avira URL Cloudsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htmR0%Avira URL Cloudsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.carterandcone.commpa0%Avira URL Cloudsafe
              http://www.carterandcone.comb0%Avira URL Cloudsafe
              http://www.galapagosdesign.com/0%URL Reputationsafe
              http://www.galapagosdesign.com/0%URL Reputationsafe
              http://www.galapagosdesign.com/0%URL Reputationsafe
              http://www.carterandcone.comf0%Avira URL Cloudsafe
              http://www.carterandcone.comsof0%Avira URL Cloudsafe
              http://www.carterandcone.comTC0%URL Reputationsafe
              http://www.carterandcone.comTC0%URL Reputationsafe
              http://www.carterandcone.comTC0%URL Reputationsafe
              http://www.sandoll.co.krn0%Avira URL Cloudsafe
              http://www.fontbureau.coma0%URL Reputationsafe
              http://www.fontbureau.coma0%URL Reputationsafe
              http://www.fontbureau.coma0%URL Reputationsafe
              http://www.fontbureau.come.com0%URL Reputationsafe
              http://www.fontbureau.come.com0%URL Reputationsafe
              http://www.fontbureau.come.com0%URL Reputationsafe
              http://www.sakkal.com80%Avira URL Cloudsafe
              http://en.w0%URL Reputationsafe
              http://en.w0%URL Reputationsafe
              http://en.w0%URL Reputationsafe
              http://www.carterandcone.comn0%Avira URL Cloudsafe
              http://www.goodfont.co.krF0%Avira URL Cloudsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.carterandcone.comghtv0%Avira URL Cloudsafe
              http://www.monotype.0%URL Reputationsafe
              http://www.monotype.0%URL Reputationsafe
              http://www.monotype.0%URL Reputationsafe
              http://www.monotype.-0%Avira URL Cloudsafe
              http://www.galapagosdesign.com/90%Avira URL Cloudsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.agfamonotype.00%Avira URL Cloudsafe
              http://www.sandoll.co.krn-u0%Avira URL Cloudsafe
              http://www.carterandcone.comark0%Avira URL Cloudsafe
              http://www.founder.com.cn/cn&0%Avira URL Cloudsafe
              http://www.carterandcone.comies0%Avira URL Cloudsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              203.215.12.0.in-addr.arpa
              unknown
              unknownfalse
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://www.founder.com.cn/cnO5O857649056366403032021.PDF.exe, 00000002.00000003.222841537.000000000626E000.00000004.00000001.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.fontbureau.com/designersG5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                  high
                  http://www.carterandcone.comadeh5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designers/?5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bThe5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                      high
                      http://www.fontbureau.com/designersW5O857649056366403032021.PDF.exe, 00000002.00000003.232516116.0000000006268000.00000004.00000001.sdmpfalse
                        high
                        http://www.tiro.com5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.com/5O857649056366403032021.PDF.exe, 00000002.00000003.223882735.0000000006268000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designers5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000003.243602370.0000000006268000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000003.243672472.0000000006268000.00000004.00000001.sdmpfalse
                          high
                          http://www.fontbureau.com/designers/O5O857649056366403032021.PDF.exe, 00000002.00000003.229591196.0000000006278000.00000004.00000001.sdmpfalse
                            high
                            http://www.goodfont.co.kr5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000003.222340087.000000000626E000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.com5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000003.224185573.0000000006268000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comceTF5O857649056366403032021.PDF.exe, 00000002.00000002.772908055.00000000014F7000.00000004.00000040.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmpfalse
                              high
                              http://www.sajatypeworks.com5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netD5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/cThe5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnr-c5O857649056366403032021.PDF.exe, 00000002.00000003.223199362.0000000006265000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htm5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.com5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.monotype.t5O857649056366403032021.PDF.exe, 00000002.00000003.240555318.0000000006268000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.founder.com.cn/cn/X5O857649056366403032021.PDF.exe, 00000002.00000003.223388192.0000000006265000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.carterandcone.comht5O857649056366403032021.PDF.exe, 00000002.00000003.224554700.0000000006268000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://whatismyipaddress.com/-5O857649056366403032021.PDF.exe, 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmpfalse
                                high
                                http://www.carterandcone.comTC15O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.galapagosdesign.com/DPlease5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comTC/5O857649056366403032021.PDF.exe, 00000002.00000003.224185573.0000000006268000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.carterandcone.comitk5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://login.yahoo.com/config/loginvbc.exefalse
                                  high
                                  http://www.fonts.com5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.goodfont.co.krny5O857649056366403032021.PDF.exe, 00000002.00000003.222340087.000000000626E000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.sandoll.co.kr5O857649056366403032021.PDF.exe, 00000002.00000003.222273989.000000000626E000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    • URL Reputation: safe
                                    unknown
                                    http://www.site.com/logs.php5O857649056366403032021.PDF.exe, 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.carterandcone.comTC35O857649056366403032021.PDF.exe, 00000002.00000003.224554700.0000000006268000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.urwpp.deDPlease5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.nirsoft.net/vbc.exe, vbc.exe, 00000008.00000002.262898420.0000000000400000.00000040.00000001.sdmpfalse
                                        high
                                        http://www.zhongyicts.com.cn5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/staff/dennis.htmR5O857649056366403032021.PDF.exe, 00000002.00000003.236539415.0000000006268000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name5O857649056366403032021.PDF.exe, 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.sakkal.com5O857649056366403032021.PDF.exe, 00000002.00000003.227490771.0000000006268000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.commpa5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fontbureau.com/designerst5O857649056366403032021.PDF.exe, 00000002.00000003.233214847.0000000006268000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designersr5O857649056366403032021.PDF.exe, 00000002.00000003.232557212.0000000006268000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.carterandcone.comb5O857649056366403032021.PDF.exe, 00000002.00000003.224554700.0000000006268000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.apache.org/licenses/LICENSE-2.05O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.fontbureau.com5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.galapagosdesign.com/5O857649056366403032021.PDF.exe, 00000002.00000003.235768370.0000000006278000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.carterandcone.comf5O857649056366403032021.PDF.exe, 00000002.00000003.227770906.0000000006268000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.carterandcone.comsof5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.carterandcone.comTC5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.sandoll.co.krn5O857649056366403032021.PDF.exe, 00000002.00000003.222652479.000000000626E000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.fontbureau.coma5O857649056366403032021.PDF.exe, 00000002.00000002.772908055.00000000014F7000.00000004.00000040.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.come.com5O857649056366403032021.PDF.exe, 00000002.00000002.772908055.00000000014F7000.00000004.00000040.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.sakkal.com85O857649056366403032021.PDF.exe, 00000002.00000003.227490771.0000000006268000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://en.w5O857649056366403032021.PDF.exe, 00000002.00000003.224554700.0000000006268000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.carterandcone.comn5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.goodfont.co.krF5O857649056366403032021.PDF.exe, 00000002.00000003.222340087.000000000626E000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.carterandcone.coml5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers/cabarga.htmlN5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://www.founder.com.cn/cn5O857649056366403032021.PDF.exe, 00000002.00000003.222841537.000000000626E000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers/frere-jones.html5O857649056366403032021.PDF.exe, 00000002.00000003.231534012.0000000006268000.00000004.00000001.sdmp, 5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                                                      high
                                                      http://www.carterandcone.comghtv5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.monotype.5O857649056366403032021.PDF.exe, 00000002.00000003.238156321.0000000006268000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.monotype.-5O857649056366403032021.PDF.exe, 00000002.00000003.234952955.0000000006268000.00000004.00000001.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      low
                                                      http://www.galapagosdesign.com/95O857649056366403032021.PDF.exe, 00000002.00000003.235768370.0000000006278000.00000004.00000001.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.jiyu-kobo.co.jp/5O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.fontbureau.com/designers85O857649056366403032021.PDF.exe, 00000002.00000002.782376344.0000000007452000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://www.agfamonotype.05O857649056366403032021.PDF.exe, 00000002.00000003.243737730.0000000006268000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        low
                                                        http://www.sandoll.co.krn-u5O857649056366403032021.PDF.exe, 00000002.00000003.222340087.000000000626E000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.fontbureau.com/designers:5O857649056366403032021.PDF.exe, 00000002.00000003.231609808.0000000006268000.00000004.00000001.sdmpfalse
                                                          high
                                                          http://www.carterandcone.comark5O857649056366403032021.PDF.exe, 00000002.00000003.224323142.0000000006268000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.founder.com.cn/cn&5O857649056366403032021.PDF.exe, 00000002.00000003.223199362.0000000006265000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.fontbureau.com/designers/5O857649056366403032021.PDF.exe, 00000002.00000003.229567284.0000000006268000.00000004.00000001.sdmpfalse
                                                            high
                                                            http://www.carterandcone.comies5O857649056366403032021.PDF.exe, 00000002.00000003.224083852.0000000006268000.00000004.00000001.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown

                                                            Contacted IPs

                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs

                                                            Public

                                                            IPDomainCountryFlagASNASN NameMalicious

                                                            Private

                                                            IP
                                                            192.168.2.1

                                                            General Information

                                                            Joe Sandbox Version:31.0.0 Emerald
                                                            Analysis ID:362120
                                                            Start date:03.03.2021
                                                            Start time:17:13:51
                                                            Joe Sandbox Product:CloudBasic
                                                            Overall analysis duration:0h 14m 9s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:light
                                                            Sample file name:5O857649056366403032021.PDF.exe
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                            Number of analysed new started processes analysed:35
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • HDC enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Detection:MAL
                                                            Classification:mal100.phis.troj.spyw.evad.winEXE@8/7@1/1
                                                            EGA Information:
                                                            • Successful, ratio: 75%
                                                            HDC Information:
                                                            • Successful, ratio: 4.1% (good quality ratio 3.9%)
                                                            • Quality average: 85.1%
                                                            • Quality standard deviation: 23.6%
                                                            HCA Information:
                                                            • Successful, ratio: 100%
                                                            • Number of executed functions: 0
                                                            • Number of non-executed functions: 0
                                                            Cookbook Comments:
                                                            • Adjust boot time
                                                            • Enable AMSI
                                                            • Found application associated with file extension: .exe
                                                            Warnings:
                                                            Show All
                                                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                            • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                            • Excluded IPs from analysis (whitelisted): 168.61.161.212, 131.253.33.200, 13.107.22.200, 51.11.168.160, 184.30.21.219, 104.43.193.48, 40.88.32.150, 23.211.6.115, 104.42.151.234, 52.255.188.83, 184.30.20.56, 8.248.135.254, 8.241.122.254, 8.241.11.126, 8.241.123.254, 8.248.131.254, 2.20.142.209, 2.20.142.210, 51.104.139.180, 92.122.213.247, 92.122.213.194, 20.54.26.129, 52.155.217.156
                                                            • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, storeedgefd.xbetservices.akadns.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, storeedgefd.dsx.mp.microsoft.com, www.bing.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, db3p-ris-pf-prod-atm.trafficmanager.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, storeedgefd.dsx.mp.microsoft.com.edgekey.net, skypedataprdcolcus15.cloudapp.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, e16646.dscg.akamaiedge.net, skypedataprdcolwus16.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                            • Execution Graph export aborted for target vbc.exe, PID 6732 because there are no executed function
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                            • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.

                                                            Simulations

                                                            Behavior and APIs

                                                            TimeTypeDescription
                                                            17:14:43API Interceptor6x Sleep call for process: 5O857649056366403032021.PDF.exe modified
                                                            17:15:12API Interceptor1x Sleep call for process: WerFault.exe modified

                                                            Joe Sandbox View / Context

                                                            IPs

                                                            No context

                                                            Domains

                                                            No context

                                                            ASN

                                                            No context

                                                            JA3 Fingerprints

                                                            No context

                                                            Dropped Files

                                                            No context

                                                            Created / dropped Files

                                                            C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_vbc.exe_29b1fd91934ca85fd856bebf7e23b59544bb3f14_6c16ead4_1afe9588\Report.wer
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):10936
                                                            Entropy (8bit):3.773645507675144
                                                            Encrypted:false
                                                            SSDEEP:192:+oRmKDX5HBUZMXQf9jU3//u7swS274ItE7GDBh:NbDZBUZMXojM/u7swX4ItEOn
                                                            MD5:B990CB6AF75858E6F2C29C7A53953022
                                                            SHA1:43D20E7FF25881476A44DBA8066C662B9D6F9D65
                                                            SHA-256:840F9558BFC0DF3028B17747557F6164B8E047E9731644A87B3141550915A256
                                                            SHA-512:B71B19F6D1A887457695FDBF710EC4A5ED4592B19D9573FBA4F01DF34C7704113E762817D7E0284146318D75CB699EA51A259192A717D09A17956343104F77E3
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.9.2.9.4.1.0.9.1.1.4.0.7.2.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.9.2.9.4.1.1.0.3.1.7.1.9.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.d.d.e.a.9.d.1.-.6.f.0.4.-.4.2.8.b.-.9.b.7.2.-.7.d.1.1.7.3.0.7.d.6.d.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.e.7.4.c.3.7.e.-.b.e.f.5.-.4.5.b.1.-.8.d.0.c.-.7.a.f.0.5.a.f.f.2.7.3.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.v.b.c...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.v.b.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.4.c.-.0.0.0.1.-.0.0.1.7.-.7.6.a.0.-.3.8.c.f.9.3.1.0.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.7.8.7.d.9.a.6.e.c.3.f.2.6.2.e.8.b.7.1.d.1.9.a.c.1.5.7.c.2.a.2.8.6.a.0.f.5.9.d.d.!.v.b.c.
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER89A1.tmp.dmp
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:Mini DuMP crash report, 14 streams, Thu Mar 4 01:15:09 2021, 0x1205a4 type
                                                            Category:dropped
                                                            Size (bytes):37050
                                                            Entropy (8bit):2.0647926238959364
                                                            Encrypted:false
                                                            SSDEEP:192:mrNMAoQcWWXDPJk2Y+CVRd5AveQFkJQHN:mxLD1MDPJNYpVRYVFtN
                                                            MD5:A2F4BCACEA6B487455496EC0281A8FE7
                                                            SHA1:4AE0F67C760C25F5A15ADB46BC37FECC07E2B965
                                                            SHA-256:29A4BB5E95C231AB869D21CC52C38715C301C284C929A6373ECA620166B6370F
                                                            SHA-512:C801CDEE2BD1999FE06174664428CEB3C6C898F1D4782F3F6D327D5BA3497297CC4F079337CAD4B07D3D14FE8A462CDC8681F9A5C69508C391A1E8E3091CA4A2
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview: MDMP....... ........4@`...................U...........B..............GenuineIntelW...........T.......L....4@`.............................0..2...............P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER8BF4.tmp.WERInternalMetadata.xml
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):8344
                                                            Entropy (8bit):3.703927038018695
                                                            Encrypted:false
                                                            SSDEEP:192:Rrl7r3GLNimG6A76Yqy6fFgmf5BSMCprY89bof7wsftv4m:RrlsNi36O6Yn69gmfPSRovfP
                                                            MD5:9945E1B9A8D937B18F9DC31E975F1215
                                                            SHA1:D61DCA56AAB3B6A1EE3B673D21BFA85086BDECAD
                                                            SHA-256:0524E26D1CAA772616E33EBE260F28969494A6005A7ECECF6C563FCFCDBEB0EE
                                                            SHA-512:62A8E6240F47C58371DF1B8E99872777F0C9B6832AAE413A9F7FEED95CF45E9BBC91D4934372DD7C587392E54A576D2FF5A49112D950B42889DBDA386BDE76CB
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.3.2.<./.P.i.d.>.......
                                                            C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D8B.tmp.xml
                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):4643
                                                            Entropy (8bit):4.480489970942812
                                                            Encrypted:false
                                                            SSDEEP:48:cvIwSD8zs8iJgtWI9q0WSC8Bg8fm8M4JlEZFqXK+q8VUwlMSHOd:uITfh9tSNTJauXKJwlTHOd
                                                            MD5:9CCE89CAAB7F11B1DC13431E291B8398
                                                            SHA1:365BDCF2293020750BFFB7F152B6834BE896D161
                                                            SHA-256:DEF6B8F3897C80489FA0764A912542D8A4340DCB5ED74E6FB6115CC0C3550F1B
                                                            SHA-512:1E2ED9E04CE0E1FA1900BE7C60346E40A1D089A02DC0E97DF8434657067F4185092A361EFE2FCDDD794CFCD028326A264217C1C92E6954EB115731B52951CFEB
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="886225" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5O857649056366403032021.PDF.exe.log
                                                            Process:C:\Users\user\Desktop\5O857649056366403032021.PDF.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1314
                                                            Entropy (8bit):5.350128552078965
                                                            Encrypted:false
                                                            SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
                                                            MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
                                                            SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
                                                            SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
                                                            SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                            C:\Users\user\AppData\Roaming\pid.txt
                                                            Process:C:\Users\user\Desktop\5O857649056366403032021.PDF.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):4
                                                            Entropy (8bit):0.8112781244591328
                                                            Encrypted:false
                                                            SSDEEP:3:E3n:E3n
                                                            MD5:587B7B833034299FDD5F4B10E7DC9FCA
                                                            SHA1:4B9F94F92A6FFAEE7BF14533AE679C1D396EBBB7
                                                            SHA-256:739B312AE914CFC44AB85100D93F3BA28C22DFE7FBBD4CEE9072C19A11D87411
                                                            SHA-512:767B4ACB5EAA5C81E7810C3571818BA44BF35934991D46D80B3AAF4F33F73B313861D5AE58F0BFFBA2DE7FAD455D62923D4EDC5DC1AEAF30B12C652D7EC96223
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview: 5444
                                                            C:\Users\user\AppData\Roaming\pidloc.txt
                                                            Process:C:\Users\user\Desktop\5O857649056366403032021.PDF.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):54
                                                            Entropy (8bit):4.712949307598833
                                                            Encrypted:false
                                                            SSDEEP:3:oNWXp5vQqhWfR88XukA:oNWXpFQSWxDA
                                                            MD5:CCDB3AB1EE56552E9E8D0D47D18B1C78
                                                            SHA1:8B56F93FB2AC5E73F461E8742C26062E9B82B22D
                                                            SHA-256:A6884B2FA05A5C130256A76EC80C1B88F854A967A4B1DC966774A94DB0C0A4AB
                                                            SHA-512:C6E1F1815014566DDF8AA8973431B85A713E94D7008A2B403F9A4995F72FA89C55EBBF740F1860F6E115219460621291A7255EE6D250592AD27A3CE8FC7C6C4D
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview: C:\Users\user\Desktop\5O857649056366403032021.PDF.exe

                                                            Static File Info

                                                            General

                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.637398703052732
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Windows Screen Saver (13104/52) 0.07%
                                                            • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                            File name:5O857649056366403032021.PDF.exe
                                                            File size:1057280
                                                            MD5:a67f05d542bcee462ecc03ae4d8195d6
                                                            SHA1:eeb590aaa3c47851ae6f678c29aec2ba1b54df8f
                                                            SHA256:1e96629ba4b537932150cc517455a0cfddcb7c35a4a0998d107643dc887b31c3
                                                            SHA512:270f31f9481dd1259a890de29b22c59adc21fbeaad17ff3c22ed739214d3ea490b086dd0ec8b92fa9f1e9d3cbda5e3ca97406d2d4f18e4a87ba09e0ac83deaa5
                                                            SSDEEP:24576:c4ZIZrK3Orlv80WSRbvuvDzAolFCdNtIEBIQxBwqA:3Zd3xSRK4olkdQE
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...x.>`..............P.............N7... ........@.. ....................................@................................

                                                            File Icon

                                                            Icon Hash:00828e8e8686b000

                                                            Static PE Info

                                                            General

                                                            Entrypoint:0x50374e
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                            Time Stamp:0x603EE278 [Wed Mar 3 01:12:24 2021 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:v4.0.30319
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                            Entrypoint Preview

                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al

                                                            Data Directories

                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1037000x4b.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1040000x600.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1060000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                            Sections

                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000x1017540x101800False0.826626972087data7.64304839327IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                            .rsrc0x1040000x6000x600False0.434244791667data4.20816553114IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x1060000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                            Resources

                                                            NameRVASizeTypeLanguageCountry
                                                            RT_VERSION0x1040900x370data
                                                            RT_MANIFEST0x1044100x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                            Imports

                                                            DLLImport
                                                            mscoree.dll_CorExeMain

                                                            Version Infos

                                                            DescriptionData
                                                            Translation0x0000 0x04b0
                                                            LegalCopyrightCopyright 2020 - 2021
                                                            Assembly Version1.0.0.0
                                                            InternalNameNotSupportedException.exe
                                                            FileVersion1.0.0.0
                                                            CompanyNameAgario
                                                            LegalTrademarks
                                                            Comments
                                                            ProductNameSnake Game
                                                            ProductVersion1.0.0.0
                                                            FileDescriptionSnake Game
                                                            OriginalFilenameNotSupportedException.exe

                                                            Network Behavior

                                                            Network Port Distribution

                                                            UDP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Mar 3, 2021 17:14:33.214509964 CET4987353192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:33.260349989 CET53498738.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:33.709773064 CET5319653192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:33.758582115 CET53531968.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:33.914417982 CET5677753192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:33.960149050 CET53567778.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:34.240216017 CET5864353192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:34.321981907 CET53586438.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:34.408603907 CET6098553192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:34.456425905 CET53609858.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:35.405508041 CET5020053192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:35.451615095 CET53502008.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:36.435086966 CET5128153192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:36.491914988 CET53512818.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:37.438740969 CET4919953192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:37.483431101 CET5062053192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:37.484256983 CET53491998.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:37.543839931 CET53506208.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:39.445708990 CET6493853192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:39.491714954 CET53649388.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:40.667319059 CET6015253192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:40.716125965 CET53601528.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:41.989645958 CET5754453192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:42.037026882 CET53575448.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:14:58.696459055 CET5598453192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:14:58.753180027 CET53559848.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:01.106949091 CET6418553192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:01.152890921 CET53641858.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:01.163681030 CET6511053192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:01.214071035 CET53651108.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:02.767374039 CET5836153192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:02.813678980 CET53583618.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:04.194222927 CET6349253192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:04.240705967 CET53634928.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:05.250946045 CET6083153192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:05.299650908 CET53608318.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:06.904519081 CET6010053192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:06.950258017 CET53601008.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:08.590962887 CET5319553192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:08.636954069 CET53531958.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:09.509015083 CET5014153192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:09.568008900 CET53501418.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:10.655904055 CET5302353192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:10.701605082 CET53530238.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:11.877171993 CET4956353192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:11.922899961 CET53495638.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:12.121400118 CET5135253192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:12.171503067 CET53513528.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:13.808252096 CET5934953192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:13.857146978 CET53593498.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:14.778565884 CET5708453192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:14.824393034 CET53570848.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:20.228868008 CET5882353192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:20.274827003 CET53588238.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:29.668606043 CET5756853192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:29.716171026 CET53575688.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:29.807586908 CET5054053192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:29.863745928 CET53505408.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:15:48.932668924 CET5436653192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:15:48.981421947 CET53543668.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:16:01.827075958 CET5303453192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:16:01.872833967 CET53530348.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:16:20.140646935 CET5776253192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:16:20.196206093 CET53577628.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:16:53.634814978 CET5543553192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:16:53.682331085 CET53554358.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:12.506916046 CET5071353192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:12.556099892 CET53507138.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:30.583940029 CET5613253192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:30.643706083 CET53561328.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:32.108513117 CET5898753192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:32.167363882 CET53589878.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:32.696746111 CET5657953192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:32.742829084 CET53565798.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:33.303934097 CET6063353192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:33.375474930 CET53606338.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:34.003638983 CET6129253192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:34.068038940 CET53612928.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:38.208647966 CET6361953192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:38.269738913 CET53636198.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:38.780533075 CET6493853192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:38.835195065 CET53649388.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:39.593573093 CET6194653192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:39.642622948 CET53619468.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:40.453255892 CET6491053192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:40.512172937 CET53649108.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:41.080837965 CET5212353192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:41.153503895 CET53521238.8.8.8192.168.2.3
                                                            Mar 3, 2021 17:17:54.798070908 CET5613053192.168.2.38.8.8.8
                                                            Mar 3, 2021 17:17:54.860306978 CET53561308.8.8.8192.168.2.3

                                                            DNS Queries

                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                            Mar 3, 2021 17:15:01.163681030 CET192.168.2.38.8.8.80x589cStandard query (0)203.215.12.0.in-addr.arpaPTR (Pointer record)IN (0x0001)

                                                            DNS Answers

                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                            Mar 3, 2021 17:15:01.214071035 CET8.8.8.8192.168.2.30x589cName error (3)203.215.12.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)

                                                            Code Manipulations

                                                            Statistics

                                                            Behavior

                                                            Click to jump to process

                                                            System Behavior

                                                            General

                                                            Start time:17:14:41
                                                            Start date:03/03/2021
                                                            Path:C:\Users\user\Desktop\5O857649056366403032021.PDF.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Users\user\Desktop\5O857649056366403032021.PDF.exe'
                                                            Imagebase:0x340000
                                                            File size:1057280 bytes
                                                            MD5 hash:A67F05D542BCEE462ECC03AE4D8195D6
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.218552903.00000000027D1000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000000.00000002.219158430.00000000037D9000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                            Reputation:low

                                                            General

                                                            Start time:17:14:44
                                                            Start date:03/03/2021
                                                            Path:C:\Users\user\Desktop\5O857649056366403032021.PDF.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\Desktop\5O857649056366403032021.PDF.exe
                                                            Imagebase:0xca0000
                                                            File size:1057280 bytes
                                                            MD5 hash:A67F05D542BCEE462ECC03AE4D8195D6
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 00000002.00000002.784876138.0000000008720000.00000004.00000001.sdmp, Author: Arnim Rupp
                                                            • Rule: RAT_HawkEye, Description: Detects HawkEye RAT, Source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000002.00000002.767924598.0000000000402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                            • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000002.00000002.778097540.00000000041A9000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000002.00000002.778097540.00000000041A9000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: HKTL_NET_GUID_Stealer, Description: Detects c# red/black-team tools via typelibguid, Source: 00000002.00000002.785047145.0000000008890000.00000004.00000001.sdmp, Author: Arnim Rupp
                                                            • Rule: JoeSecurity_HawkEye, Description: Yara detected HawkEye Keylogger, Source: 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: Hawkeye, Description: detect HawkEye in memory, Source: 00000002.00000002.774686882.00000000031A1000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                            Reputation:low

                                                            General

                                                            Start time:17:15:05
                                                            Start date:03/03/2021
                                                            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holderwb.txt'
                                                            Imagebase:0x400000
                                                            File size:1171592 bytes
                                                            MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_WebBrowserPassView, Description: Yara detected WebBrowserPassView password recovery tool, Source: 00000007.00000002.275551658.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:17:15:05
                                                            Start date:03/03/2021
                                                            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext 'C:\Users\user\AppData\Local\Temp\holdermail.txt'
                                                            Imagebase:0x400000
                                                            File size:1171592 bytes
                                                            MD5 hash:C63ED21D5706A527419C9FBD730FFB2E
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_MailPassView, Description: Yara detected MailPassView, Source: 00000008.00000002.262898420.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                            Reputation:high

                                                            General

                                                            Start time:17:15:07
                                                            Start date:03/03/2021
                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6732 -s 516
                                                            Imagebase:0xed0000
                                                            File size:434592 bytes
                                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            Disassembly

                                                            Code Analysis

                                                            Reset < >