Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SOA.exe

Overview

General Information

Sample Name:SOA.exe
Analysis ID:626099
MD5:f18604d5fc3e2930e85c403e0e80a459
SHA1:aa0517c10c333f9a9a64eba154ea915464ebf2bb
SHA256:46584937f3c753886bb38030047dd11c73d46bf01c5e52a95118108634ee2081
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Writes to foreign memory regions
Modifies the hosts file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • SOA.exe (PID: 6968 cmdline: "C:\Users\user\Desktop\SOA.exe" MD5: F18604D5FC3E2930E85C403E0E80A459)
    • RegSvcs.exe (PID: 6360 cmdline: {path} MD5: 2867A3817C9245F7CF518524DFD18F28)
  • cleanup
{"C2 url": "https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "1295185895", "Chat URL": "https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.700193844.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000006.00000002.700193844.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000006.00000000.474512000.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000006.00000000.474512000.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000006.00000000.474083361.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 18 entries
            SourceRuleDescriptionAuthorStrings
            6.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              6.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                6.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  6.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x30dcf:$s1: get_kbok
                  • 0x3172a:$s2: get_CHoo
                  • 0x3239d:$s3: set_passwordIsSet
                  • 0x30bd3:$s4: get_enableLog
                  • 0x35378:$s8: torbrowser
                  • 0x33d54:$s10: logins
                  • 0x33629:$s11: credential
                  • 0x2ffb6:$g1: get_Clipboard
                  • 0x2ffc4:$g2: get_Keyboard
                  • 0x2ffd1:$g3: get_Password
                  • 0x315d8:$g4: get_CtrlKeyDown
                  • 0x315e8:$g5: get_ShiftKeyDown
                  • 0x315f9:$g6: get_AltKeyDown
                  6.0.RegSvcs.exe.400000.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 30 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 6.0.RegSvcs.exe.400000.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1295185895", "Chat URL": "https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendDocument"}
                    Source: RegSvcs.exe.6360.6.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendMessage"}
                    Source: SOA.exeVirustotal: Detection: 56%Perma Link
                    Source: SOA.exeReversingLabs: Detection: 53%
                    Source: SOA.exeJoe Sandbox ML: detected
                    Source: 6.0.RegSvcs.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 6.0.RegSvcs.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                    Source: 6.0.RegSvcs.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                    Source: 6.2.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 6.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 6.0.RegSvcs.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                    Source: SOA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: SOA.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Networking

                    barindex
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA.exe.362a900.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA.exe.3508a50.2.raw.unpack, type: UNPACKEDPE
                    Source: RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: RegSvcs.exe, 00000006.00000002.703155934.00000000034AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                    Source: RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bLHfhV.com
                    Source: RegSvcs.exe, 00000006.00000002.705181600.000000000632B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.435642434.000000000555D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: SOA.exe, 00000000.00000003.435642434.000000000555D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.comX
                    Source: RegSvcs.exe, 00000006.00000002.703086304.0000000003499000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: SOA.exe, 00000000.00000003.440875113.000000000552A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: SOA.exe, 00000000.00000003.440412042.000000000552A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como.F
                    Source: SOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers$
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: SOA.exe, 00000000.00000003.446934456.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: SOA.exe, 00000000.00000003.446934456.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comC.TTFZ
                    Source: SOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comM.TTF
                    Source: SOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
                    Source: SOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcea
                    Source: SOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
                    Source: SOA.exe, 00000000.00000003.446934456.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdQ
                    Source: SOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
                    Source: SOA.exe, 00000000.00000002.482171495.0000000005520000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.475894950.0000000005520000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgreta
                    Source: SOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comitu
                    Source: SOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commv
                    Source: SOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsivF
                    Source: SOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comueed
                    Source: SOA.exe, 00000000.00000003.435412641.000000000555D000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: SOA.exe, 00000000.00000003.435412641.000000000555D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com;S;
                    Source: SOA.exe, 00000000.00000003.438672593.0000000005522000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.439229235.0000000005529000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438684745.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.439030633.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.439157151.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: SOA.exe, 00000000.00000003.439030633.0000000005523000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: SOA.exe, 00000000.00000003.438406518.0000000005522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnd
                    Source: SOA.exe, 00000000.00000003.438383167.000000000552C000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438258519.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438340040.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnkj
                    Source: SOA.exe, 00000000.00000003.438383167.000000000552C000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438258519.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438340040.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnl-s
                    Source: SOA.exe, 00000000.00000003.438672593.0000000005522000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438684745.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cny
                    Source: SOA.exe, 00000000.00000003.448559842.000000000552A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441539964.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: SOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/.
                    Source: SOA.exe, 00000000.00000003.441539964.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//
                    Source: SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Boldv
                    Source: SOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.443375135.000000000552B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.444062249.000000000552B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441539964.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.443868372.000000000552B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.443934615.000000000552B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/P
                    Source: SOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0-e
                    Source: SOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441539964.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/d
                    Source: SOA.exe, 00000000.00000003.443934615.000000000552B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                    Source: SOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/Z
                    Source: SOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/m
                    Source: SOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/lt
                    Source: SOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/m
                    Source: SOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/oi
                    Source: SOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/v
                    Source: SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/waS
                    Source: SOA.exe, 00000000.00000003.448417236.0000000005529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
                    Source: SOA.exe, 00000000.00000003.434290760.000000000553B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: SOA.exe, 00000000.00000003.434290760.000000000553B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com-e=n
                    Source: SOA.exe, 00000000.00000003.434281330.0000000005544000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comTF
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: SOA.exe, 00000000.00000003.443375135.000000000552B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.comr
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: SOA.exe, 00000000.00000003.439513237.0000000005524000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.439443516.0000000005522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.439443516.0000000005522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: SOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: SOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deivb
                    Source: SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%$
                    Source: RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                    Source: RegSvcs.exe, 00000006.00000002.703086304.0000000003499000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: SOA.exe, 00000000.00000002.480070555.00000000034AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.700193844.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000000.473274806.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/
                    Source: RegSvcs.exe, 00000006.00000002.703086304.0000000003499000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.705130100.000000000630A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendDocument
                    Source: RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendDocumentdocument-----
                    Source: RegSvcs.exe, 00000006.00000002.703086304.0000000003499000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4Kl
                    Source: RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://jkqQodeR5y.net
                    Source: SOA.exe, 00000000.00000002.480070555.00000000034AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.700193844.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000000.473274806.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: unknownDNS traffic detected: queries for: api.telegram.org

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                    System Summary

                    barindex
                    Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 6.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SOA.exe.362a900.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 6.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 6.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 6.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SOA.exe.362a900.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.SOA.exe.3508a50.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: RegSvcs.exe PID: 6360, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 6.0.RegSvcs.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b2F5ED5A7u002d845Cu002d44F8u002dB96Bu002d10B79141A2A8u007d/u003318549B0u002dEE33u002d4898u002dAEAEu002d1AF000D2687D.csLarge array initialization: .cctor: array initializer size 12054
                    Source: 6.0.RegSvcs.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007b2F5ED5A7u002d845Cu002d44F8u002dB96Bu002d10B79141A2A8u007d/u003318549B0u002dEE33u002d4898u002dAEAEu002d1AF000D2687D.csLarge array initialization: .cctor: array initializer size 12054
                    Source: 6.0.RegSvcs.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007b2F5ED5A7u002d845Cu002d44F8u002dB96Bu002d10B79141A2A8u007d/u003318549B0u002dEE33u002d4898u002dAEAEu002d1AF000D2687D.csLarge array initialization: .cctor: array initializer size 12054
                    Source: 6.0.RegSvcs.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b2F5ED5A7u002d845Cu002d44F8u002dB96Bu002d10B79141A2A8u007d/u003318549B0u002dEE33u002d4898u002dAEAEu002d1AF000D2687D.csLarge array initialization: .cctor: array initializer size 12054
                    Source: SOA.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 6.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SOA.exe.362a900.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 6.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 6.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 6.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SOA.exe.362a900.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.SOA.exe.3508a50.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: RegSvcs.exe PID: 6360, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\SOA.exeCode function: 0_2_0230E4B90_2_0230E4B9
                    Source: C:\Users\user\Desktop\SOA.exeCode function: 0_2_0230E4C80_2_0230E4C8
                    Source: C:\Users\user\Desktop\SOA.exeCode function: 0_2_0230CBDC0_2_0230CBDC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02F147A06_2_02F147A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02F147306_2_02F14730
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02F147106_2_02F14710
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_02F1D6606_2_02F1D660
                    Source: SOA.exe, 00000000.00000002.479817724.0000000002A09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SOA.exe
                    Source: SOA.exe, 00000000.00000002.476749846.00000000001DE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamex2pyR.exe^ vs SOA.exe
                    Source: SOA.exe, 00000000.00000002.477962760.0000000002491000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs SOA.exe
                    Source: SOA.exe, 00000000.00000002.477962760.0000000002491000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoBLNvZyKJYCHghVcVugUtfbRmkDGLhBrmDQkpn.exe4 vs SOA.exe
                    Source: SOA.exe, 00000000.00000002.480070555.00000000034AF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SOA.exe
                    Source: SOA.exe, 00000000.00000002.480070555.00000000034AF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoBLNvZyKJYCHghVcVugUtfbRmkDGLhBrmDQkpn.exe4 vs SOA.exe
                    Source: SOA.exe, 00000000.00000002.483419679.00000000076C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SOA.exe
                    Source: SOA.exeBinary or memory string: OriginalFilenamex2pyR.exe^ vs SOA.exe
                    Source: SOA.exeVirustotal: Detection: 56%
                    Source: SOA.exeReversingLabs: Detection: 53%
                    Source: SOA.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\SOA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\SOA.exe "C:\Users\user\Desktop\SOA.exe"
                    Source: C:\Users\user\Desktop\SOA.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                    Source: C:\Users\user\Desktop\SOA.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SOA.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SOA.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.adwa.evad.winEXE@3/2@1/0
                    Source: C:\Users\user\Desktop\SOA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeMutant created: \Sessions\1\BaseNamedObjects\JHFJngVRuKk
                    Source: 6.0.RegSvcs.exe.400000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 6.0.RegSvcs.exe.400000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 6.0.RegSvcs.exe.400000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 6.0.RegSvcs.exe.400000.3.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 6.0.RegSvcs.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 6.0.RegSvcs.exe.400000.2.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\SOA.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: SOA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SOA.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.02001355184
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: SOA.exe PID: 6968, type: MEMORYSTR
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\SOA.exe TID: 6992Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1673Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8179Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SOA.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: RegSvcs.exe, 00000006.00000002.705130100.000000000630A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllQ
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: SOA.exe, 00000000.00000002.479009843.0000000002728000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                    Source: C:\Users\user\Desktop\SOA.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SOA.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43A000Jump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: E72008Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Users\user\Desktop\SOA.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SOA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA.exe PID: 6968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6360, type: MEMORYSTR
                    Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA.exe.362a900.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA.exe.362a900.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA.exe.3508a50.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.700193844.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.474512000.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.474083361.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.473274806.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.473700502.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.480070555.00000000034AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA.exe PID: 6968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6360, type: MEMORYSTR
                    Source: Yara matchFile source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6360, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA.exe PID: 6968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6360, type: MEMORYSTR
                    Source: Yara matchFile source: 6.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA.exe.362a900.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA.exe.362a900.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SOA.exe.3508a50.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000006.00000002.700193844.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.474512000.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.474083361.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.473274806.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000000.473700502.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.480070555.00000000034AF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SOA.exe PID: 6968, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6360, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    Path Interception211
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping211
                    Security Software Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Web Service
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    File and Directory Permissions Modification
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                    Disable or Modify Tools
                    Security Account Manager131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)131
                    Virtualization/Sandbox Evasion
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer1
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script211
                    Process Injection
                    LSA Secrets113
                    System Information Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Deobfuscate/Decode Files or Information
                    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    Obfuscated Files or Information
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
                    Software Packing
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SOA.exe57%VirustotalBrowse
                    SOA.exe54%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    SOA.exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    6.0.RegSvcs.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    6.0.RegSvcs.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                    6.0.RegSvcs.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                    6.2.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    6.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    6.0.RegSvcs.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.jiyu-kobo.co.jp/lt0%URL Reputationsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://fontfabrik.comX0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://www.fontbureau.comC.TTFZ0%Avira URL Cloudsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.fontbureau.comessed0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.com0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.sakkal.comr0%URL Reputationsafe
                    http://www.fontbureau.comgreta0%URL Reputationsafe
                    http://www.founder.com.cn/cny0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp//0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/.0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/jp/m0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/Boldv0%Avira URL Cloudsafe
                    https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.founder.com.cn/cnl-s0%URL Reputationsafe
                    http://www.urwpp.de0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.fontbureau.commv0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/waS0%Avira URL Cloudsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://www.fontbureau.comueed0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/jp/Z0%URL Reputationsafe
                    http://www.founder.com.cn/cnd0%URL Reputationsafe
                    http://www.galapagosdesign.com/0%URL Reputationsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    http://www.sajatypeworks.comTF0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    http://www.carterandcone.como.F0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/P0%URL Reputationsafe
                    http://www.sajatypeworks.com-e=n0%Avira URL Cloudsafe
                    https://jkqQodeR5y.net0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/oi0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                    http://www.fontbureau.comd0%URL Reputationsafe
                    https://api.ipify.org%$0%Avira URL Cloudsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.tiro.0%URL Reputationsafe
                    http://www.founder.com.cn/cn/0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.comdQ0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/v0%URL Reputationsafe
                    http://www.monotype.0%URL Reputationsafe
                    http://www.fontbureau.comsivF0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/m0%URL Reputationsafe
                    http://www.fontbureau.comcea0%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/Y0-e0%URL Reputationsafe
                    http://www.fonts.com;S;0%Avira URL Cloudsafe
                    http://www.fontbureau.comitu0%URL Reputationsafe
                    http://www.fontbureau.comals0%URL Reputationsafe
                    http://www.fontbureau.comM.TTF0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/d0%URL Reputationsafe
                    https://api.telegram.org4Kl0%Avira URL Cloudsafe
                    http://bLHfhV.com0%Avira URL Cloudsafe
                    http://www.urwpp.deivb0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cnkj0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.jiyu-kobo.co.jp/ltSOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.fontbureau.com/designersGSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers/?SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://fontfabrik.comXSOA.exe, 00000000.00000003.435642434.000000000555D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.founder.com.cn/cn/bTheSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.orgRegSvcs.exe, 00000006.00000002.703086304.0000000003499000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designers?SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comC.TTFZSOA.exe, 00000000.00000003.446934456.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.tiro.comSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.439443516.0000000005522000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designersSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comessedSOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.goodfont.co.krSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comSOA.exe, 00000000.00000003.440875113.000000000552A000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comSOA.exe, 00000000.00000003.434290760.000000000553B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn/cTheSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/staff/dennis.htmSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://fontfabrik.comSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.435642434.000000000555D000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.comrSOA.exe, 00000000.00000003.443375135.000000000552B000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comgretaSOA.exe, 00000000.00000002.482171495.0000000005520000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.475894950.0000000005520000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cnySOA.exe, 00000000.00000003.438672593.0000000005522000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438684745.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp//SOA.exe, 00000000.00000003.441539964.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/.SOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/mSOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPleaseSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/BoldvSOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://api.ipify.org%GETMozilla/5.0RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                low
                                http://www.fonts.comSOA.exe, 00000000.00000003.435412641.000000000555D000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sandoll.co.krSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnl-sSOA.exe, 00000000.00000003.438383167.000000000552C000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438258519.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438340040.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deSOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cnSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.commvSOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/waSSOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000006.00000002.703086304.0000000003499000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sakkal.comSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipSOA.exe, 00000000.00000002.480070555.00000000034AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.700193844.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000000.473274806.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comueedSOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/jp/ZSOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cndSOA.exe, 00000000.00000003.438406518.0000000005522000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.apache.org/licenses/LICENSE-2.0SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.comSOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.galapagosdesign.com/SOA.exe, 00000000.00000003.448559842.000000000552A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://DynDns.comDynDNSRegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comTFSOA.exe, 00000000.00000003.434281330.0000000005544000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendDocumentRegSvcs.exe, 00000006.00000002.703086304.0000000003499000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.705130100.000000000630A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.carterandcone.como.FSOA.exe, 00000000.00000003.440412042.000000000552A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/PSOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.443375135.000000000552B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.444062249.000000000552B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441539964.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.443868372.000000000552B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.443934615.000000000552B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/SOA.exe, 00000000.00000002.480070555.00000000034AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.700193844.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000000.473274806.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sajatypeworks.com-e=nSOA.exe, 00000000.00000003.434290760.000000000553B000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            low
                                            https://jkqQodeR5y.netRegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/oiSOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.jiyu-kobo.co.jp/jp/SOA.exe, 00000000.00000003.443934615.000000000552B000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comdSOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://api.telegram.org/bot2134979594:AAFk4QkrlHlt2a-q-EhIoHZBbzxSH0QxiBI/sendDocumentdocument-----RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://api.ipify.org%$RegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              low
                                              http://www.carterandcone.comlSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.tiro.SOA.exe, 00000000.00000003.439513237.0000000005524000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.439443516.0000000005522000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.founder.com.cn/cn/SOA.exe, 00000000.00000003.439030633.0000000005523000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers/cabarga.htmlNSOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.founder.com.cn/cnSOA.exe, 00000000.00000003.438672593.0000000005522000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.439229235.0000000005529000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438684745.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.439030633.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.439157151.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designers/frere-jones.htmlSOA.exe, 00000000.00000003.446934456.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fontbureau.comdQSOA.exe, 00000000.00000003.446934456.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/vSOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.monotype.SOA.exe, 00000000.00000003.448417236.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.comsivFSOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.jiyu-kobo.co.jp/mSOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers$SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fontbureau.comceaSOA.exe, 00000000.00000003.446256425.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.jiyu-kobo.co.jp/SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441539964.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.jiyu-kobo.co.jp/Y0-eSOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fonts.com;S;SOA.exe, 00000000.00000003.435412641.000000000555D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    low
                                                    http://www.fontbureau.com/designers8SOA.exe, 00000000.00000002.482711624.0000000006732000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.fontbureau.comituSOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.fontbureau.comalsSOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.fontbureau.comM.TTFSOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.447402029.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.jiyu-kobo.co.jp/dSOA.exe, 00000000.00000003.442006747.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442900542.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442505928.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.442058750.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441539964.0000000005523000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441742704.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.441856636.0000000005528000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://api.telegram.org4KlRegSvcs.exe, 00000006.00000002.703086304.0000000003499000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://api.telegram.orgRegSvcs.exe, 00000006.00000002.703155934.00000000034AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://bLHfhV.comRegSvcs.exe, 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.urwpp.deivbSOA.exe, 00000000.00000003.447627882.000000000552A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.founder.com.cn/cnkjSOA.exe, 00000000.00000003.438383167.000000000552C000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438258519.0000000005528000.00000004.00000800.00020000.00000000.sdmp, SOA.exe, 00000000.00000003.438340040.0000000005529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        No contacted IP infos
                                                        Joe Sandbox Version:34.0.0 Boulder Opal
                                                        Analysis ID:626099
                                                        Start date and time: 13/05/202215:42:102022-05-13 15:42:10 +02:00
                                                        Joe Sandbox Product:CloudBasic
                                                        Overall analysis duration:0h 9m 15s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Sample file name:SOA.exe
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                        Number of analysed new started processes analysed:21
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • HDC enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Detection:MAL
                                                        Classification:mal100.troj.adwa.evad.winEXE@3/2@1/0
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HDC Information:
                                                        • Successful, ratio: 0.1% (good quality ratio 0%)
                                                        • Quality average: 20%
                                                        • Quality standard deviation: 28.3%
                                                        HCA Information:
                                                        • Successful, ratio: 99%
                                                        • Number of executed functions: 23
                                                        • Number of non-executed functions: 3
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Adjust boot time
                                                        • Enable AMSI
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                                        • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        TimeTypeDescription
                                                        15:43:41API Interceptor1x Sleep call for process: SOA.exe modified
                                                        15:44:04API Interceptor610x Sleep call for process: RegSvcs.exe modified
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                        api.telegram.orge3.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        d5.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        TransactionAdviceDetailsReport-20220513-091440.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        NN doc,TT Swift Copy.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        SHIPPING DETAILS.PIF.EXEGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        Updatedcontract051222.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        Order_List.xlsxGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        Halkbank_Ekstre_20220512_082357_541079.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        soa.xlsxGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        SecuriteInfo.com.W32.AIDetect.malware2.8516.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        Angebot Nr. 58022.xlsxGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        doc_65398086_4190362045539.pdf.vbsGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        SecuriteInfo.com.Variant.Lazy.178938.10008.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        Mvmsrl 0512-22021.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        VbmzgOe1Fz4Uga_PI3miSQ9U3_9DMk7Z3HHiGkggepo.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        TNT AWB.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        T#U00dcB#U0130TAK SAGE F#U0130YAT TEKL#U0130F #U0130STE#U011e#U0130_xlsx.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        TransactionAdviceDetailsReport-20220512-091440.pdf.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        4BDAd47i.txt.cmdGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        Elden Ring Installer.exeGet hashmaliciousBrowse
                                                        • 149.154.167.220
                                                        No context
                                                        No context
                                                        No context
                                                        Process:C:\Users\user\Desktop\SOA.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1216
                                                        Entropy (8bit):5.355304211458859
                                                        Encrypted:false
                                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                        MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                        SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                        SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                        SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                        Malicious:true
                                                        Reputation:high, very likely benign file
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):835
                                                        Entropy (8bit):4.694294591169137
                                                        Encrypted:false
                                                        SSDEEP:24:QWDZh+ragzMZfuMMs1L/JU5fFCkK8T1rTt8:vDZhyoZWM9rU5fFcP
                                                        MD5:6EB47C1CF858E25486E42440074917F2
                                                        SHA1:6A63F93A95E1AE831C393A97158C526A4FA0FAAE
                                                        SHA-256:9B13A3EA948A1071A81787AAC1930B89E30DF22CE13F8FF751F31B5D83E79FFB
                                                        SHA-512:08437AB32E7E905EB11335E670CDD5D999803390710ED39CBC31A2D3F05868D5D0E5D051CCD7B06A85BB466932F99A220463D27FAC29116D241E8ADAC495FA2F
                                                        Malicious:true
                                                        Reputation:high, very likely benign file
                                                        Preview:# Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....127.0.0.1
                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Entropy (8bit):7.018221482722969
                                                        TrID:
                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                        • DOS Executable Generic (2002/1) 0.01%
                                                        File name:SOA.exe
                                                        File size:833024
                                                        MD5:f18604d5fc3e2930e85c403e0e80a459
                                                        SHA1:aa0517c10c333f9a9a64eba154ea915464ebf2bb
                                                        SHA256:46584937f3c753886bb38030047dd11c73d46bf01c5e52a95118108634ee2081
                                                        SHA512:c39bd01bca62779434b0508bc66972cd7030153469f631b425e1b77af59fd7db1a26a837ea2b7440c9f93cd538c43c2f2005ebcf34b982c03ceed71a4c3b685c
                                                        SSDEEP:12288:7HE2ISZ5m4fuOjUTPXmkHz/b9m+DhLrRvoXSf+bnl8tTac2aVzBQXOCmxqogCSsV:b3NUXmkTjZFRvoCmblML
                                                        TLSH:1705A59C722831DFC85BD276DAA81C68EA90757F931F5103A02715AD9A1CAC7EF148F3
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....|b..............P.................. ........@.. ....................... ............@................................
                                                        Icon Hash:00828e8e8686b000
                                                        Entrypoint:0x4cc11e
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                        Time Stamp:0x627C8C90 [Thu May 12 04:26:56 2022 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:v4.0.30319
                                                        OS Version Major:4
                                                        OS Version Minor:0
                                                        File Version Major:4
                                                        File Version Minor:0
                                                        Subsystem Version Major:4
                                                        Subsystem Version Minor:0
                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                        Instruction
                                                        jmp dword ptr [00402000h]
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xcc0cc0x4f.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xce0000xf00.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000xc.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x20000xca1240xca200False0.611404220779data7.02001355184IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                        .rsrc0xce0000xf000x1000False0.35791015625data4.853048536IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0xd00000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountry
                                                        RT_VERSION0xce0a00x348data
                                                        RT_MANIFEST0xce3e80xb15XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators
                                                        DLLImport
                                                        mscoree.dll_CorExeMain
                                                        DescriptionData
                                                        Translation0x0000 0x04b0
                                                        LegalCopyrightCopyright 2022
                                                        Assembly Version1.0.0.0
                                                        InternalNamex2pyR.exe
                                                        FileVersion1.0.0.0
                                                        CompanyNameBean Cafe
                                                        LegalTrademarks
                                                        Comments
                                                        ProductNameManagerial and Cashier Screens
                                                        ProductVersion1.0.0.0
                                                        FileDescriptionBean Cafe
                                                        OriginalFilenamex2pyR.exe
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        May 13, 2022 15:45:33.422219992 CEST5066853192.168.2.58.8.8.8
                                                        May 13, 2022 15:45:33.441097021 CEST53506688.8.8.8192.168.2.5
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                        May 13, 2022 15:45:33.422219992 CEST192.168.2.58.8.8.80x92a0Standard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                        May 13, 2022 15:45:33.441097021 CEST8.8.8.8192.168.2.50x92a0No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:15:43:24
                                                        Start date:13/05/2022
                                                        Path:C:\Users\user\Desktop\SOA.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\SOA.exe"
                                                        Imagebase:0x110000
                                                        File size:833024 bytes
                                                        MD5 hash:F18604D5FC3E2930E85C403E0E80A459
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.480070555.00000000034AF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.480070555.00000000034AF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low

                                                        Target ID:6
                                                        Start time:15:43:44
                                                        Start date:13/05/2022
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:{path}
                                                        Imagebase:0xdf0000
                                                        File size:45152 bytes
                                                        MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:.Net C# or VB.NET
                                                        Yara matches:
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.700193844.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000002.700193844.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000000.474512000.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000000.474512000.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000000.474083361.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000000.474083361.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000000.473274806.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000000.473274806.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000000.473700502.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000000.473700502.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000006.00000002.702221188.0000000003131000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                        Reputation:high

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:9.7%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:65
                                                          Total number of Limit Nodes:4
                                                          execution_graph 10930 230bb10 10931 230bb76 10930->10931 10934 230bcd0 10931->10934 10937 230b874 10934->10937 10938 230bd38 DuplicateHandle 10937->10938 10939 230bc25 10938->10939 10958 2306560 10959 2306570 10958->10959 10962 23056b4 10959->10962 10961 230657d 10963 23056bf 10962->10963 10966 2305284 10963->10966 10965 2306625 10965->10961 10967 230528f 10966->10967 10970 23052b4 10967->10970 10969 2306b0a 10969->10965 10971 23052bf 10970->10971 10974 23066b0 10971->10974 10973 2306c02 10973->10969 10976 23066bb 10974->10976 10975 230735c 10975->10973 10976->10975 10978 230b440 10976->10978 10980 230b461 10978->10980 10979 230b485 10979->10975 10980->10979 10982 230b9f8 10980->10982 10983 230ba05 10982->10983 10984 230ba3f 10983->10984 10986 230b7ec 10983->10986 10984->10979 10987 230b7f7 10986->10987 10989 230c330 10987->10989 10990 230b8d4 10987->10990 10989->10989 10991 230b8df 10990->10991 10992 23066b0 2 API calls 10991->10992 10993 230c39f 10991->10993 10992->10993 10997 230e120 10993->10997 11003 230e138 10993->11003 10994 230c3d8 10994->10989 10998 230e1b6 10997->10998 11000 230e169 10997->11000 10998->10994 10999 230e175 10999->10994 11000->10999 11009 230e480 11000->11009 11012 230e471 11000->11012 11004 230e1b6 11003->11004 11006 230e169 11003->11006 11004->10994 11005 230e175 11005->10994 11006->11005 11007 230e480 2 API calls 11006->11007 11008 230e471 2 API calls 11006->11008 11007->11004 11008->11004 11010 2309810 LoadLibraryExW GetModuleHandleW 11009->11010 11011 230e489 11009->11011 11010->11011 11011->10998 11013 2309810 LoadLibraryExW GetModuleHandleW 11012->11013 11014 230e489 11013->11014 11014->10998 10940 2309718 10941 2309727 10940->10941 10943 2309810 10940->10943 10944 2309823 10943->10944 10946 230983b 10944->10946 10950 2309a98 10944->10950 10945 2309833 10945->10946 10947 2309a38 GetModuleHandleW 10945->10947 10946->10941 10948 2309a65 10947->10948 10948->10941 10951 2309aac 10950->10951 10952 2309ad1 10951->10952 10954 2309508 10951->10954 10952->10945 10955 2309c78 LoadLibraryExW 10954->10955 10957 2309cf1 10955->10957 10957->10952

                                                          Control-flow Graph

                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 02309A56
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477749289.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2300000_SOA.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 347b73c5b61f55e849f2a57bbdd43a32e74eaec2170d9b99ba251148601d4f7a
                                                          • Instruction ID: 8e661e61c0b735b31389a0ce6b62578f21a104eb177d708f1bda8f68e20ae1fe
                                                          • Opcode Fuzzy Hash: 347b73c5b61f55e849f2a57bbdd43a32e74eaec2170d9b99ba251148601d4f7a
                                                          • Instruction Fuzzy Hash: DA712470A00B058FD724DF6AC09079ABBF5BF88714F00892ED49ADBA81D775E905CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 55 230b874-230bdcc DuplicateHandle 57 230bdd5-230bdf2 55->57 58 230bdce-230bdd4 55->58 58->57
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0230BCFE,?,?,?,?,?), ref: 0230BDBF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477749289.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2300000_SOA.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 9b907d99e52281246f36a4cbfb1ea5632f003c4a0f784c0fbeeb76195440183e
                                                          • Instruction ID: b56134991a3b872f1c3d08928d14c2ab7dc52ffba9f5b6e58a8329e4273cdc3e
                                                          • Opcode Fuzzy Hash: 9b907d99e52281246f36a4cbfb1ea5632f003c4a0f784c0fbeeb76195440183e
                                                          • Instruction Fuzzy Hash: AF21E3B59002089FDB10CF99D884BDEFBF9EB48324F14845AE915B3350D374A954DFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 61 2309508-2309cb8 63 2309cc0-2309cef LoadLibraryExW 61->63 64 2309cba-2309cbd 61->64 65 2309cf1-2309cf7 63->65 66 2309cf8-2309d15 63->66 64->63 65->66
                                                          APIs
                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02309AD1,00000800,00000000,00000000), ref: 02309CE2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477749289.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2300000_SOA.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad
                                                          • String ID:
                                                          • API String ID: 1029625771-0
                                                          • Opcode ID: 95794ce504b040788b48136cec226bbd891694ad3a5923f025fe9106dc3cf203
                                                          • Instruction ID: be416ff62a99fd2663906c516b2596eb80329dc2f4a75a3f325a3e0311f1932e
                                                          • Opcode Fuzzy Hash: 95794ce504b040788b48136cec226bbd891694ad3a5923f025fe9106dc3cf203
                                                          • Instruction Fuzzy Hash: E81103B6D00209DFDB10CF9AD488BDEFBF8EB48724F14842AE515A7241C374A545CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 69 23099f0-2309a30 70 2309a32-2309a35 69->70 71 2309a38-2309a63 GetModuleHandleW 69->71 70->71 72 2309a65-2309a6b 71->72 73 2309a6c-2309a80 71->73 72->73
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 02309A56
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477749289.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2300000_SOA.jbxd
                                                          Similarity
                                                          • API ID: HandleModule
                                                          • String ID:
                                                          • API String ID: 4139908857-0
                                                          • Opcode ID: 191e73f3b83f38c2e3e4e6fd5700dc2bbc50e66d339adf0be82c10a07c0898b2
                                                          • Instruction ID: 0ae868ffa66143bfda1b88bfe3970a993723775cca1df54933b2cded6b7ba515
                                                          • Opcode Fuzzy Hash: 191e73f3b83f38c2e3e4e6fd5700dc2bbc50e66d339adf0be82c10a07c0898b2
                                                          • Instruction Fuzzy Hash: 2711E3B5D006498FCB10CF9AD484BDEFBF8EB48624F14841AD469B7640D379A545CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477404987.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c3d000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5e1bf6b8f374c64a0baae93565fa0a0d54d9f7458e47b369fc528a342470a86e
                                                          • Instruction ID: 569a13957c82d9b126faa90ff4b5a6f742e7f6bc35135d37ca5f48513550067b
                                                          • Opcode Fuzzy Hash: 5e1bf6b8f374c64a0baae93565fa0a0d54d9f7458e47b369fc528a342470a86e
                                                          • Instruction Fuzzy Hash: 292125B2514244DFDB01DF54E8C0B27BF66FB98328F248569E80B0B256C336E955DBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477482733.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c4d000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ec5e39601111464a2fe2b7ee1da69832a94062b8c67fbe00780106dc83cb0701
                                                          • Instruction ID: 63c6f98bdd42ac9c63b7bf2aa004b68dda0a576d2fbeba6d3b58ac8194c948c5
                                                          • Opcode Fuzzy Hash: ec5e39601111464a2fe2b7ee1da69832a94062b8c67fbe00780106dc83cb0701
                                                          • Instruction Fuzzy Hash: CA210771504244EFDB11EF50D9C0B16BBA5FB84328F24CAADE80A4B342C3B6DC46CA61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477482733.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c4d000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e0301f16ed96c95546109abea6ddf846828a2c3125c2c4bd89078812fa814e56
                                                          • Instruction ID: 6eecf70ab745af565dd7a360a1c5d2b96a0e9c25710d4299995e6917f4877c35
                                                          • Opcode Fuzzy Hash: e0301f16ed96c95546109abea6ddf846828a2c3125c2c4bd89078812fa814e56
                                                          • Instruction Fuzzy Hash: 8521F275504244DFCB14EF60D9C4B16BB65FB84328F24C9ADE80A4B246C37AD846CAA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477482733.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c4d000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 76daa6e5a17bab0f5cda28bb757140c35b15b4e3b9349fe2c12449d23bbb7e15
                                                          • Instruction ID: 6ba872df5f1f0cdbeef244f99346869502649fe5bdd52025979f5d71d9e16812
                                                          • Opcode Fuzzy Hash: 76daa6e5a17bab0f5cda28bb757140c35b15b4e3b9349fe2c12449d23bbb7e15
                                                          • Instruction Fuzzy Hash: 902180755093C08FCB02CF20D994B15BF71FB46314F28C5EAD8498B697C33A990ACB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477404987.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c3d000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f695eed339961eed004f4f78b14fba75fcb2e3654d3ef5a3d5d17d5512e929ac
                                                          • Instruction ID: 4eb34f10b56bb8fad7e4aa0bc5244a2d8cbaffadb6c5de5b01233264f06d1335
                                                          • Opcode Fuzzy Hash: f695eed339961eed004f4f78b14fba75fcb2e3654d3ef5a3d5d17d5512e929ac
                                                          • Instruction Fuzzy Hash: 2011D3B6804280DFCF12CF14D5C4B16BF72FB94324F24C6A9D9060B656C336D95ACBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477482733.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c4d000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2df07a04d63089680a5583d4301b8fc40ec6fda85becc815b4c71da8115e23d0
                                                          • Instruction ID: f0429cd9371a618fafc1a5521e5ad375d264245acdc7546b354dd2fbf3cd55fa
                                                          • Opcode Fuzzy Hash: 2df07a04d63089680a5583d4301b8fc40ec6fda85becc815b4c71da8115e23d0
                                                          • Instruction Fuzzy Hash: 37118B75904280DFCB11DF10D5C4B15BBB1FB84324F28C6ADD84A4B656C37AD94ACB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477404987.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c3d000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 52543296b0c5324d64d47bc43f5c9a1b94deca12a9ea0cada0cddfb70feb5009
                                                          • Instruction ID: 8a749284997df27b54d53c02588c1b60da0d1217ddf9deb0ae7c48a60d307378
                                                          • Opcode Fuzzy Hash: 52543296b0c5324d64d47bc43f5c9a1b94deca12a9ea0cada0cddfb70feb5009
                                                          • Instruction Fuzzy Hash: 7D01F7314083449AD7108E15EC84BA7BBDCEF42778F18841AFD161A24AD3789984DAB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477404987.0000000000C3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C3D000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c3d000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 52e767c641684684257f3f1354e179f43c2a3ac98fb7963ff454411dde1837d1
                                                          • Instruction ID: 6c968469e3d8435c49284058289f5ebcefa4f58fcef4c36a2d798fb7fdb6862f
                                                          • Opcode Fuzzy Hash: 52e767c641684684257f3f1354e179f43c2a3ac98fb7963ff454411dde1837d1
                                                          • Instruction Fuzzy Hash: 9FF0C2714083889FE7108E05ECC4B62FBDCEB42734F18C45AED580B286C3789D44CAB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477749289.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2300000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4fd50e8287331a25152f462e89195ac8c55c7df442fd1e488fadc2c79fd54666
                                                          • Instruction ID: 3397d7e0b5a0a65378bc6ea035bb30ece41be69a47e36a80d9e3f85d4c1ae0a7
                                                          • Opcode Fuzzy Hash: 4fd50e8287331a25152f462e89195ac8c55c7df442fd1e488fadc2c79fd54666
                                                          • Instruction Fuzzy Hash: 8412F9F1C917468AEB79CF65E4881893BB8F745328FD04A28DA612F6D0D7B4116ECF84
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477749289.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2300000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6e70b19b730d73a630d313e1b03718abfaf96a70a90452afb410fa5a27f175de
                                                          • Instruction ID: 306f3444049fe3a194270fbf1894036a377b6f0606e2504f91eba16315ad4ca0
                                                          • Opcode Fuzzy Hash: 6e70b19b730d73a630d313e1b03718abfaf96a70a90452afb410fa5a27f175de
                                                          • Instruction Fuzzy Hash: E8A17C32E002198FCF15DFA5C8945DEBBF6FF85304B15856AE805BB261EB31A906CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.477749289.0000000002300000.00000040.00000800.00020000.00000000.sdmp, Offset: 02300000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2300000_SOA.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1ac2125ec6c8afb8c8b6d108025b85dc10f8981c4a6d124553627772432d699c
                                                          • Instruction ID: 3266f52c4272cd538719d7c1dca894f81d05e81ed2dbd6c4f8ee3375b606a85f
                                                          • Opcode Fuzzy Hash: 1ac2125ec6c8afb8c8b6d108025b85dc10f8981c4a6d124553627772432d699c
                                                          • Instruction Fuzzy Hash: CBC15FF1C917458BEB69CF65E8881893BB9FB45328FD04B28D9612B6D0D7B4106ECF44
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Execution Graph

                                                          Execution Coverage:10.3%
                                                          Dynamic/Decrypted Code Coverage:100%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:80
                                                          Total number of Limit Nodes:5
                                                          execution_graph 13630 15cd01c 13631 15cd034 13630->13631 13632 15cd08e 13631->13632 13637 2f17961 13631->13637 13645 2f15338 13631->13645 13649 2f15348 13631->13649 13653 2f13ca4 13631->13653 13640 2f179b5 13637->13640 13638 2f179e9 13642 2f179e7 13638->13642 13669 2f16964 13638->13669 13640->13638 13641 2f179d9 13640->13641 13661 2f17b10 13641->13661 13665 2f17b00 13641->13665 13646 2f1536e 13645->13646 13647 2f13ca4 CallWindowProcW 13646->13647 13648 2f1538f 13647->13648 13648->13632 13650 2f1536e 13649->13650 13651 2f13ca4 CallWindowProcW 13650->13651 13652 2f1538f 13651->13652 13652->13632 13656 2f13caf 13653->13656 13654 2f179e9 13655 2f16964 CallWindowProcW 13654->13655 13658 2f179e7 13654->13658 13655->13658 13656->13654 13657 2f179d9 13656->13657 13659 2f17b10 CallWindowProcW 13657->13659 13660 2f17b00 CallWindowProcW 13657->13660 13659->13658 13660->13658 13663 2f17b1e 13661->13663 13662 2f16964 CallWindowProcW 13662->13663 13663->13662 13664 2f17c07 13663->13664 13664->13642 13666 2f17b05 13665->13666 13667 2f16964 CallWindowProcW 13666->13667 13668 2f17c07 13666->13668 13667->13666 13668->13642 13670 2f1696f 13669->13670 13671 2f17cd2 CallWindowProcW 13670->13671 13672 2f17c81 13670->13672 13671->13672 13672->13642 13673 2f1b670 13674 2f1b684 13673->13674 13677 2f1b8ba 13674->13677 13675 2f1b68d 13678 2f1b8c3 13677->13678 13683 2f1b9a0 13677->13683 13687 2f1b991 13677->13687 13691 2f1ba9c 13677->13691 13695 2f1bab6 13677->13695 13678->13675 13684 2f1b9e4 13683->13684 13685 2f1badb 13684->13685 13699 2f1bd97 13684->13699 13688 2f1b9a0 13687->13688 13689 2f1badb 13688->13689 13690 2f1bd97 2 API calls 13688->13690 13690->13689 13692 2f1ba4f 13691->13692 13692->13691 13693 2f1badb 13692->13693 13694 2f1bd97 2 API calls 13692->13694 13694->13693 13696 2f1bac9 13695->13696 13697 2f1badb 13695->13697 13698 2f1bd97 2 API calls 13696->13698 13698->13697 13700 2f1bdb6 13699->13700 13704 2f1bdf8 13700->13704 13708 2f1bde8 13700->13708 13701 2f1bdc6 13701->13685 13705 2f1be32 13704->13705 13706 2f1be5c RtlEncodePointer 13705->13706 13707 2f1be85 13705->13707 13706->13707 13707->13701 13709 2f1bdf8 13708->13709 13710 2f1be5c RtlEncodePointer 13709->13710 13711 2f1be85 13709->13711 13710->13711 13711->13701 13712 2f16b50 GetCurrentProcess 13713 2f16bc3 13712->13713 13714 2f16bca GetCurrentThread 13712->13714 13713->13714 13715 2f16c00 13714->13715 13716 2f16c07 GetCurrentProcess 13714->13716 13715->13716 13717 2f16c3d 13716->13717 13718 2f16c65 GetCurrentThreadId 13717->13718 13719 2f16c96 13718->13719 13720 2f15190 13721 2f151f8 CreateWindowExW 13720->13721 13723 2f152b4 13721->13723 13724 2f16d78 DuplicateHandle 13725 2f16e0e 13724->13725

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 02F16BB0
                                                          • GetCurrentThread.KERNEL32 ref: 02F16BED
                                                          • GetCurrentProcess.KERNEL32 ref: 02F16C2A
                                                          • GetCurrentThreadId.KERNEL32 ref: 02F16C83
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.702016268.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_2f10000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID: Current$ProcessThread
                                                          • String ID:
                                                          • API String ID: 2063062207-0
                                                          • Opcode ID: 3608c380146735bc36a70e8bf3bc0a351697943150f18d31f554ca52a1b7be38
                                                          • Instruction ID: 63b08750eb6770866ec3e473d7c35d08af26a3b29e18d1186c2fee64ae2db8c2
                                                          • Opcode Fuzzy Hash: 3608c380146735bc36a70e8bf3bc0a351697943150f18d31f554ca52a1b7be38
                                                          • Instruction Fuzzy Hash: 8F5143B09006489FDB14CFA9C688BDEBBF4FF48318F24845AE159A7350DB746984CF65
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 02F16BB0
                                                          • GetCurrentThread.KERNEL32 ref: 02F16BED
                                                          • GetCurrentProcess.KERNEL32 ref: 02F16C2A
                                                          • GetCurrentThreadId.KERNEL32 ref: 02F16C83
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.702016268.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_2f10000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID: Current$ProcessThread
                                                          • String ID:
                                                          • API String ID: 2063062207-0
                                                          • Opcode ID: 355023b48e7242caafabb3c2ccfe412afdbef1fe154a06c8d111d9c9ff9f9eb0
                                                          • Instruction ID: cdaff3acddb3fe262742bf116cec24e9505456ef04aa5e74dd747b66d106e52c
                                                          • Opcode Fuzzy Hash: 355023b48e7242caafabb3c2ccfe412afdbef1fe154a06c8d111d9c9ff9f9eb0
                                                          • Instruction Fuzzy Hash: 3F5137B09002498FDB18CFA9D6487EEBBF4FF48318F24845AE159A7350DB746988CF65
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 39 2f15184-2f151f6 40 2f15201-2f15208 39->40 41 2f151f8-2f151fe 39->41 42 2f15213-2f1524b 40->42 43 2f1520a-2f15210 40->43 41->40 44 2f15253-2f152b2 CreateWindowExW 42->44 43->42 45 2f152b4-2f152ba 44->45 46 2f152bb-2f152f3 44->46 45->46 50 2f15300 46->50 51 2f152f5-2f152f8 46->51 52 2f15301 50->52 51->50 52->52
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02F152A2
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.702016268.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_2f10000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID: CreateWindow
                                                          • String ID:
                                                          • API String ID: 716092398-0
                                                          • Opcode ID: 5ebc16d969d269323f1415eeadf7c9138a69adab617b9222c6d099dfcb19d985
                                                          • Instruction ID: 17c2c249e037517ae66d84f2ff8aa76cf483809a137f0891cf87490ec7676569
                                                          • Opcode Fuzzy Hash: 5ebc16d969d269323f1415eeadf7c9138a69adab617b9222c6d099dfcb19d985
                                                          • Instruction Fuzzy Hash: C251CEB1D003499FDF14CFA9C884ADEBBB5FF88354F64812AE919AB210D7719985CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 53 2f15190-2f151f6 54 2f15201-2f15208 53->54 55 2f151f8-2f151fe 53->55 56 2f15213-2f152b2 CreateWindowExW 54->56 57 2f1520a-2f15210 54->57 55->54 59 2f152b4-2f152ba 56->59 60 2f152bb-2f152f3 56->60 57->56 59->60 64 2f15300 60->64 65 2f152f5-2f152f8 60->65 66 2f15301 64->66 65->64 66->66
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02F152A2
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.702016268.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_2f10000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID: CreateWindow
                                                          • String ID:
                                                          • API String ID: 716092398-0
                                                          • Opcode ID: 0f0650377cc4e7d635afb1a2fea579acde867e948472b8cb2d77b9a1a8fb8c60
                                                          • Instruction ID: b98ec0b215fdcdccc0e0129a877e5343bc756e24e079d770ae180ada4951aa66
                                                          • Opcode Fuzzy Hash: 0f0650377cc4e7d635afb1a2fea579acde867e948472b8cb2d77b9a1a8fb8c60
                                                          • Instruction Fuzzy Hash: E841D0B1D003489FDF14CFA9C884ADEBBB5FF88354F64812AE919AB210D7719885CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 67 2f16964-2f17c74 70 2f17d24-2f17d44 call 2f13ca4 67->70 71 2f17c7a-2f17c7f 67->71 78 2f17d47-2f17d54 70->78 73 2f17c81-2f17cb8 71->73 74 2f17cd2-2f17d0a CallWindowProcW 71->74 80 2f17cc1-2f17cd0 73->80 81 2f17cba-2f17cc0 73->81 75 2f17d13-2f17d22 74->75 76 2f17d0c-2f17d12 74->76 75->78 76->75 80->78 81->80
                                                          APIs
                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 02F17CF9
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.702016268.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_2f10000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID: CallProcWindow
                                                          • String ID:
                                                          • API String ID: 2714655100-0
                                                          • Opcode ID: 71b74dc28f7c72ebb4871ac9f1aad58ab592b6b203e8e7c6a5f11441eddb2a5b
                                                          • Instruction ID: ad15127903c71e1053bdaf1df821a8192d007467677ba7c5afa032e07b30fe82
                                                          • Opcode Fuzzy Hash: 71b74dc28f7c72ebb4871ac9f1aad58ab592b6b203e8e7c6a5f11441eddb2a5b
                                                          • Instruction Fuzzy Hash: 40414BB5A003498FDB14DF99C488BAAFBF5FF88324F148499E519AB311D774A941CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 84 2f16d71-2f16e0c DuplicateHandle 85 2f16e15-2f16e32 84->85 86 2f16e0e-2f16e14 84->86 86->85
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02F16DFF
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.702016268.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_2f10000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 50c70e9919c6c21ceb1c66e82bbcc614f2b690bc914e371875940313e6cd76a5
                                                          • Instruction ID: 8ccf37ba4d01545eb008869d6825d3a0ca1ae49a75d8a6960fa631958189fdd1
                                                          • Opcode Fuzzy Hash: 50c70e9919c6c21ceb1c66e82bbcc614f2b690bc914e371875940313e6cd76a5
                                                          • Instruction Fuzzy Hash: D421DFB59002089FDB00CFA9D584ADEBBF8FF08324F14841AE918B7210D378AA54DFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 89 2f16d78-2f16e0c DuplicateHandle 90 2f16e15-2f16e32 89->90 91 2f16e0e-2f16e14 89->91 91->90
                                                          APIs
                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02F16DFF
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.702016268.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_2f10000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID: DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 3793708945-0
                                                          • Opcode ID: 296fd96c38d3c579eeb6e3fe6e1089429dec4c1bf8986c2a970a187452bd1471
                                                          • Instruction ID: fddc3e18db3454ad5e2d741a5fd22c6c7bb740e70dd03f926df96320ed756ec4
                                                          • Opcode Fuzzy Hash: 296fd96c38d3c579eeb6e3fe6e1089429dec4c1bf8986c2a970a187452bd1471
                                                          • Instruction Fuzzy Hash: 2321E2B59002089FDB10CFA9D884ADEBBF8FB48324F14841AE918A3310D374A954DFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 94 2f1bde8-2f1be3a call 2f1bed0 98 2f1be40 94->98 99 2f1be3c-2f1be3e 94->99 100 2f1be45-2f1be50 98->100 99->100 101 2f1beb1-2f1bebe 100->101 102 2f1be52-2f1be83 RtlEncodePointer 100->102 104 2f1be85-2f1be8b 102->104 105 2f1be8c-2f1beac 102->105 104->105 105->101
                                                          APIs
                                                          • RtlEncodePointer.NTDLL(00000000), ref: 02F1BE72
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.702016268.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_2f10000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID: EncodePointer
                                                          • String ID:
                                                          • API String ID: 2118026453-0
                                                          • Opcode ID: 3992f68e3bdd535552899faf52018aa4488ab4fa7c760d6c594c92d36aee6550
                                                          • Instruction ID: d91b70018c03472c225347b44dbde8b811fdb4b3c0e38f117a8b883a21e5a273
                                                          • Opcode Fuzzy Hash: 3992f68e3bdd535552899faf52018aa4488ab4fa7c760d6c594c92d36aee6550
                                                          • Instruction Fuzzy Hash: 58219DB1900309CFDB50DFAAD54979EBFF4FB08358F60842AD609A7205D778A944CFA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 108 2f1bdf8-2f1be3a call 2f1bed0 111 2f1be40 108->111 112 2f1be3c-2f1be3e 108->112 113 2f1be45-2f1be50 111->113 112->113 114 2f1beb1-2f1bebe 113->114 115 2f1be52-2f1be83 RtlEncodePointer 113->115 117 2f1be85-2f1be8b 115->117 118 2f1be8c-2f1beac 115->118 117->118 118->114
                                                          APIs
                                                          • RtlEncodePointer.NTDLL(00000000), ref: 02F1BE72
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.702016268.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_2f10000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID: EncodePointer
                                                          • String ID:
                                                          • API String ID: 2118026453-0
                                                          • Opcode ID: 4352297ad3e2abc4de9fef6f91e0b671f8651ea1f35378288ebf3cc691a4ad33
                                                          • Instruction ID: 8954f9b1f857402189c3ccac841de1a0519384c971b4c619c58181158bfa63ab
                                                          • Opcode Fuzzy Hash: 4352297ad3e2abc4de9fef6f91e0b671f8651ea1f35378288ebf3cc691a4ad33
                                                          • Instruction Fuzzy Hash: 11118EB1900309CFDB50DFAAC54879EBFF4FB08358F64842AD609A7605C779A944CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.701556054.00000000015CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015CD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_15cd000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 13f1090b07cd68390e1273b1287e46837f6ee81a2e5db305ead332f36ea139fd
                                                          • Instruction ID: 91c9af97f1c571b96ebc3fba6792c589dc35f32358453683d9bbe984a18bf339
                                                          • Opcode Fuzzy Hash: 13f1090b07cd68390e1273b1287e46837f6ee81a2e5db305ead332f36ea139fd
                                                          • Instruction Fuzzy Hash: 3021F175504244DFCB11CFA8D8C0B1ABBB5FB84664F20C97DD8099F246D33AD846CAA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.701556054.00000000015CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015CD000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_15cd000_RegSvcs.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 764dfdaa82dcbdc7b8198b15d37a881f952b6be5e0ab33c1d2df5fb1681daea6
                                                          • Instruction ID: af93e11a8b19061a1b5b886bf148c42d1df9bb1e70fabfe9bd2cc4b193d54cc7
                                                          • Opcode Fuzzy Hash: 764dfdaa82dcbdc7b8198b15d37a881f952b6be5e0ab33c1d2df5fb1681daea6
                                                          • Instruction Fuzzy Hash: 62217F755093809FCB12CF68D594B15BF71FB46214F28C5EED8498F657C33A980ACBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%