Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Outstanding Balance.exe

Overview

General Information

Sample Name:Outstanding Balance.exe
Analysis ID:626553
MD5:eddb51444437ebe5e42164dd30ea5759
SHA1:dcac53c6badd60c7b042067d496b4e589eb3f49e
SHA256:a1d11129a5202dec1927642f82f5d766217d8abfb00fa88c79e9266cbdcb4f08
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Modifies the hosts file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Adds a directory exclusion to Windows Defender
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Outstanding Balance.exe (PID: 6512 cmdline: "C:\Users\user\Desktop\Outstanding Balance.exe" MD5: EDDB51444437EBE5E42164DD30EA5759)
    • powershell.exe (PID: 6900 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 6908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 6916 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wBKXRefcPdWgIF" /XML "C:\Users\user\AppData\Local\Temp\tmp2F3E.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 7012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Outstanding Balance.exe (PID: 7068 cmdline: C:\Users\user\Desktop\Outstanding Balance.exe MD5: EDDB51444437EBE5E42164DD30EA5759)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "gm@ramcoadvanced.com", "Password": "Mohcomvet97373315", "Host": "a2plcpnl0484.prod.iad2.secureserver.net"}
SourceRuleDescriptionAuthorStrings
00000008.00000000.278451114.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000008.00000000.278451114.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000008.00000002.504676152.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000008.00000002.504676152.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Outstanding Balance.exe.45003d0.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Outstanding Balance.exe.45003d0.8.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Outstanding Balance.exe.45003d0.8.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x30ea4:$s10: logins
                • 0x3090b:$s11: credential
                • 0x2ceda:$g1: get_Clipboard
                • 0x2cee8:$g2: get_Keyboard
                • 0x2cef5:$g3: get_Password
                • 0x2e1e6:$g4: get_CtrlKeyDown
                • 0x2e1f6:$g5: get_ShiftKeyDown
                • 0x2e207:$g6: get_AltKeyDown
                8.0.Outstanding Balance.exe.400000.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  8.0.Outstanding Balance.exe.400000.8.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 27 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.Outstanding Balance.exe.45003d0.8.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "gm@ramcoadvanced.com", "Password": "Mohcomvet97373315", "Host": "a2plcpnl0484.prod.iad2.secureserver.net"}
                    Source: Outstanding Balance.exeVirustotal: Detection: 38%Perma Link
                    Source: Outstanding Balance.exeReversingLabs: Detection: 46%
                    Source: C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exeVirustotal: Detection: 38%Perma Link
                    Source: C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exeReversingLabs: Detection: 46%
                    Source: Outstanding Balance.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exeJoe Sandbox ML: detected
                    Source: 8.0.Outstanding Balance.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 8.0.Outstanding Balance.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 8.2.Outstanding Balance.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 8.0.Outstanding Balance.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 8.0.Outstanding Balance.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 8.0.Outstanding Balance.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: Outstanding Balance.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                    Source: Outstanding Balance.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: Binary string: CMSASSEMBLYREFERENCEF.pdb source: Outstanding Balance.exe, wBKXRefcPdWgIF.exe.0.dr
                    Source: global trafficTCP traffic: 192.168.2.3:49745 -> 198.71.236.16:587
                    Source: global trafficTCP traffic: 192.168.2.3:49745 -> 198.71.236.16:587
                    Source: Outstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: Outstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a2plcpnl0484.prod.iad2.secureserver.net
                    Source: Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/0
                    Source: Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/sfig2.crt0
                    Source: Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.starfieldtech.com/repository/1402
                    Source: Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.starfieldtech.com/sfig2s1-387.crl0c
                    Source: Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.starfieldtech.com/sfroot-g2.crl0L
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.starfieldtech.com/0;
                    Source: Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.starfieldtech.com/0F
                    Source: Outstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://rPudMB.com
                    Source: Outstanding Balance.exe, 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: Outstanding Balance.exe, 00000000.00000002.281859512.0000000001897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comas
                    Source: Outstanding Balance.exe, 00000000.00000002.281859512.0000000001897000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: Outstanding Balance.exe, 00000008.00000002.507109922.0000000002F4F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://SjVl8ze1qIuT.com
                    Source: Outstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                    Source: Outstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
                    Source: Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://certs.starfieldtech.com/repository/0
                    Source: Outstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownDNS traffic detected: queries for: a2plcpnl0484.prod.iad2.secureserver.net

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                    System Summary

                    barindex
                    Source: 0.2.Outstanding Balance.exe.45003d0.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.0.Outstanding Balance.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.2.Outstanding Balance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.0.Outstanding Balance.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.0.Outstanding Balance.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 8.0.Outstanding Balance.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Outstanding Balance.exe.4475db0.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Outstanding Balance.exe.4475db0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 8.0.Outstanding Balance.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Outstanding Balance.exe.45003d0.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Outstanding Balance.exe.4445598.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Outstanding Balance.exe.4445598.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: Outstanding Balance.exe
                    Source: 8.0.Outstanding Balance.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007bC1525E6Bu002dD2FAu002d4C35u002d8640u002d8EE63B540BF9u007d/B0AA1D0Cu002d605Au002d4525u002dBAFEu002d3EBEF2A8C869.csLarge array initialization: .cctor: array initializer size 11696
                    Source: 8.0.Outstanding Balance.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007bC1525E6Bu002dD2FAu002d4C35u002d8640u002d8EE63B540BF9u007d/B0AA1D0Cu002d605Au002d4525u002dBAFEu002d3EBEF2A8C869.csLarge array initialization: .cctor: array initializer size 11696
                    Source: 8.2.Outstanding Balance.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bC1525E6Bu002dD2FAu002d4C35u002d8640u002d8EE63B540BF9u007d/B0AA1D0Cu002d605Au002d4525u002dBAFEu002d3EBEF2A8C869.csLarge array initialization: .cctor: array initializer size 11696
                    Source: Outstanding Balance.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                    Source: 0.2.Outstanding Balance.exe.45003d0.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.0.Outstanding Balance.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.2.Outstanding Balance.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.0.Outstanding Balance.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.0.Outstanding Balance.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 8.0.Outstanding Balance.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Outstanding Balance.exe.4475db0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Outstanding Balance.exe.4475db0.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 8.0.Outstanding Balance.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Outstanding Balance.exe.45003d0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Outstanding Balance.exe.4445598.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Outstanding Balance.exe.4445598.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 0_2_031443600_2_03144360
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 0_2_031440B10_2_031440B1
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 0_2_031440C00_2_031440C0
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0127F3788_2_0127F378
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_012765628_2_01276562
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0127F6C08_2_0127F6C0
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629F7228_2_0629F722
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629E4088_2_0629E408
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062975358_2_06297535
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06296DA88_2_06296DA8
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629CB608_2_0629CB60
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062944F88_2_062944F8
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629B2B08_2_0629B2B0
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062933308_2_06293330
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629AC338_2_0629AC33
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_064125A88_2_064125A8
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_064148F08_2_064148F0
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_064152C08_2_064152C0
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_064182808_2_06418280
                    Source: Outstanding Balance.exeBinary or memory string: OriginalFilename vs Outstanding Balance.exe
                    Source: Outstanding Balance.exe, 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenametvcEchBlMUsVIGmbmIssQ.exe4 vs Outstanding Balance.exe
                    Source: Outstanding Balance.exe, 00000000.00000002.280822412.0000000000E52000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCMSASSEMBLYREFERENCEF.exe6 vs Outstanding Balance.exe
                    Source: Outstanding Balance.exe, 00000000.00000002.288153558.0000000007C00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs Outstanding Balance.exe
                    Source: Outstanding Balance.exe, 00000000.00000002.284064952.0000000004445000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDotNetZipAdditionalPlatforms.dllZ vs Outstanding Balance.exe
                    Source: Outstanding Balance.exe, 00000000.00000002.284064952.0000000004445000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenametvcEchBlMUsVIGmbmIssQ.exe4 vs Outstanding Balance.exe
                    Source: Outstanding Balance.exeBinary or memory string: OriginalFilename vs Outstanding Balance.exe
                    Source: Outstanding Balance.exe, 00000008.00000002.505605879.0000000000CF8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Outstanding Balance.exe
                    Source: Outstanding Balance.exe, 00000008.00000000.274712112.0000000000872000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCMSASSEMBLYREFERENCEF.exe6 vs Outstanding Balance.exe
                    Source: Outstanding Balance.exe, 00000008.00000000.278451114.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenametvcEchBlMUsVIGmbmIssQ.exe4 vs Outstanding Balance.exe
                    Source: Outstanding Balance.exeBinary or memory string: OriginalFilenameCMSASSEMBLYREFERENCEF.exe6 vs Outstanding Balance.exe
                    Source: Outstanding Balance.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: wBKXRefcPdWgIF.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: Outstanding Balance.exeVirustotal: Detection: 38%
                    Source: Outstanding Balance.exeReversingLabs: Detection: 46%
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile read: C:\Users\user\Desktop\Outstanding Balance.exeJump to behavior
                    Source: Outstanding Balance.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Outstanding Balance.exe "C:\Users\user\Desktop\Outstanding Balance.exe"
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wBKXRefcPdWgIF" /XML "C:\Users\user\AppData\Local\Temp\tmp2F3E.tmp
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Users\user\Desktop\Outstanding Balance.exe C:\Users\user\Desktop\Outstanding Balance.exe
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exeJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wBKXRefcPdWgIF" /XML "C:\Users\user\AppData\Local\Temp\tmp2F3E.tmpJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Users\user\Desktop\Outstanding Balance.exe C:\Users\user\Desktop\Outstanding Balance.exeJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile created: C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exeJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2F3E.tmpJump to behavior
                    Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@9/9@1/1
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7012:120:WilError_01
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6908:120:WilError_01
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeMutant created: \Sessions\1\BaseNamedObjects\mutgBYqsDAl
                    Source: Outstanding Balance.exe, n6/xF.csCryptographic APIs: 'CreateDecryptor'
                    Source: Outstanding Balance.exe, n6/xF.csCryptographic APIs: 'CreateDecryptor'
                    Source: wBKXRefcPdWgIF.exe.0.dr, n6/xF.csCryptographic APIs: 'CreateDecryptor'
                    Source: wBKXRefcPdWgIF.exe.0.dr, n6/xF.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.Outstanding Balance.exe.e50000.0.unpack, n6/xF.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.Outstanding Balance.exe.e50000.0.unpack, n6/xF.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Outstanding Balance.exe.e50000.0.unpack, n6/xF.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.Outstanding Balance.exe.e50000.0.unpack, n6/xF.csCryptographic APIs: 'CreateDecryptor'
                    Source: 8.0.Outstanding Balance.exe.870000.0.unpack, n6/xF.csCryptographic APIs: 'CreateDecryptor'
                    Source: 8.0.Outstanding Balance.exe.870000.0.unpack, n6/xF.csCryptographic APIs: 'CreateDecryptor'
                    Source: 8.0.Outstanding Balance.exe.400000.8.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 8.0.Outstanding Balance.exe.400000.8.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Outstanding Balance.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Outstanding Balance.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: Outstanding Balance.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: CMSASSEMBLYREFERENCEF.pdb source: Outstanding Balance.exe, wBKXRefcPdWgIF.exe.0.dr

                    Data Obfuscation

                    barindex
                    Source: Outstanding Balance.exe, n6/xF.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: wBKXRefcPdWgIF.exe.0.dr, n6/xF.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 0.0.Outstanding Balance.exe.e50000.0.unpack, n6/xF.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 0.2.Outstanding Balance.exe.e50000.0.unpack, n6/xF.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 8.0.Outstanding Balance.exe.870000.0.unpack, n6/xF.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: 8.0.Outstanding Balance.exe.870000.11.unpack, n6/xF.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629166B push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06291663 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629165F push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062916AB push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062916A7 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062916B7 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629169B push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629169F push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062917A1 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062917B9 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06291789 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629179B push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06291793 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629A795 push 8B000003h; iretd 8_2_0629A79C
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062917EB push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062917D1 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629728C push E8FFFFF8h; retf 8_2_06297291
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06290040 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06292177 push edi; retn 0000h8_2_06292179
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06291827 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06291833 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629181B push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06291817 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06291863 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06291867 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_0629187F push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_06291873 push es; ret 8_2_062918C4
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062918AF push es; ret 8_2_06291910
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062918BF push es; ret 8_2_06291910
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062918B3 push es; ret 8_2_06291910
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeCode function: 8_2_062918CB push es; ret 8_2_06291910
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.76149518015
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.76149518015
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile created: C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wBKXRefcPdWgIF" /XML "C:\Users\user\AppData\Local\Temp\tmp2F3E.tmp
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Outstanding Balance.exe PID: 6512, type: MEMORYSTR
                    Source: Outstanding Balance.exe, 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: Outstanding Balance.exe, 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Outstanding Balance.exe TID: 6516Thread sleep time: -45733s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exe TID: 6532Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7056Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6956Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exe TID: 4384Thread sleep time: -18446744073709540s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exe TID: 5836Thread sleep count: 4105 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exe TID: 5836Thread sleep count: 4298 > 30Jump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6562Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1897Jump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeWindow / User API: threadDelayed 4105Jump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeWindow / User API: threadDelayed 4298Jump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeThread delayed: delay time: 45733Jump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Outstanding Balance.exe, 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Outstanding Balance.exe, 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: Outstanding Balance.exe, 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: Outstanding Balance.exe, 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Outstanding Balance.exe, n6/xF.csReference to suspicious API methods: ('fK0', 'GetProcAddress@kernel32'), ('DKK', 'LoadLibrary@kernel32')
                    Source: wBKXRefcPdWgIF.exe.0.dr, n6/xF.csReference to suspicious API methods: ('fK0', 'GetProcAddress@kernel32'), ('DKK', 'LoadLibrary@kernel32')
                    Source: 0.0.Outstanding Balance.exe.e50000.0.unpack, n6/xF.csReference to suspicious API methods: ('fK0', 'GetProcAddress@kernel32'), ('DKK', 'LoadLibrary@kernel32')
                    Source: 0.2.Outstanding Balance.exe.e50000.0.unpack, n6/xF.csReference to suspicious API methods: ('fK0', 'GetProcAddress@kernel32'), ('DKK', 'LoadLibrary@kernel32')
                    Source: 8.0.Outstanding Balance.exe.870000.0.unpack, n6/xF.csReference to suspicious API methods: ('fK0', 'GetProcAddress@kernel32'), ('DKK', 'LoadLibrary@kernel32')
                    Source: 8.0.Outstanding Balance.exe.400000.8.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 8.0.Outstanding Balance.exe.400000.4.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 8.2.Outstanding Balance.exe.400000.0.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 8.0.Outstanding Balance.exe.870000.11.unpack, n6/xF.csReference to suspicious API methods: ('fK0', 'GetProcAddress@kernel32'), ('DKK', 'LoadLibrary@kernel32')
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exe
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exeJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exeJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wBKXRefcPdWgIF" /XML "C:\Users\user\AppData\Local\Temp\tmp2F3E.tmpJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeProcess created: C:\Users\user\Desktop\Outstanding Balance.exe C:\Users\user\Desktop\Outstanding Balance.exeJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Users\user\Desktop\Outstanding Balance.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Users\user\Desktop\Outstanding Balance.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Outstanding Balance.exe.45003d0.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.Outstanding Balance.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.Outstanding Balance.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.Outstanding Balance.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.Outstanding Balance.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.Outstanding Balance.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Outstanding Balance.exe.4475db0.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.Outstanding Balance.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Outstanding Balance.exe.45003d0.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Outstanding Balance.exe.4445598.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000000.278451114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.504676152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.279068177.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.277927770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.276115153.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.284064952.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Outstanding Balance.exe PID: 6512, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Outstanding Balance.exe PID: 7068, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Outstanding Balance.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: Yara matchFile source: 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Outstanding Balance.exe PID: 7068, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Outstanding Balance.exe.45003d0.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.Outstanding Balance.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.2.Outstanding Balance.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.Outstanding Balance.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.Outstanding Balance.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.Outstanding Balance.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Outstanding Balance.exe.4475db0.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 8.0.Outstanding Balance.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Outstanding Balance.exe.45003d0.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Outstanding Balance.exe.4445598.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000008.00000000.278451114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.504676152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.279068177.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.277927770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000000.276115153.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.284064952.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Outstanding Balance.exe PID: 6512, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Outstanding Balance.exe PID: 7068, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    1
                    Scheduled Task/Job
                    11
                    Process Injection
                    1
                    File and Directory Permissions Modification
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Native API
                    Boot or Logon Initialization Scripts1
                    Scheduled Task/Job
                    11
                    Disable or Modify Tools
                    1
                    Credentials in Registry
                    114
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    Exfiltration Over Bluetooth1
                    Non-Standard Port
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain Accounts1
                    Scheduled Task/Job
                    Logon Script (Windows)Logon Script (Windows)1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager311
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    Automated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
                    Obfuscated Files or Information
                    NTDS1
                    Process Discovery
                    Distributed Component Object ModelInput CaptureScheduled Transfer11
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script13
                    Software Packing
                    LSA Secrets131
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Masquerading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items131
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Remote System Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job11
                    Process Injection
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 626553 Sample: Outstanding Balance.exe Startdate: 14/05/2022 Architecture: WINDOWS Score: 100 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Multi AV Scanner detection for dropped file 2->40 42 14 other signatures 2->42 7 Outstanding Balance.exe 7 2->7         started        process3 file4 24 C:\Users\user\AppData\...\wBKXRefcPdWgIF.exe, PE32 7->24 dropped 26 C:\...\wBKXRefcPdWgIF.exe:Zone.Identifier, ASCII 7->26 dropped 28 C:\Users\user\AppData\Local\...\tmp2F3E.tmp, XML 7->28 dropped 30 C:\Users\user\...\Outstanding Balance.exe.log, ASCII 7->30 dropped 44 Adds a directory exclusion to Windows Defender 7->44 11 Outstanding Balance.exe 2 7->11         started        16 powershell.exe 24 7->16         started        18 schtasks.exe 1 7->18         started        signatures5 process6 dnsIp7 34 a2plcpnl0484.prod.iad2.secureserver.net 198.71.236.16, 49745, 587 AS-26496-GO-DADDY-COM-LLCUS United States 11->34 32 C:\Windows\System32\drivers\etc\hosts, ASCII 11->32 dropped 46 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->46 48 Tries to steal Mail credentials (via file / registry access) 11->48 50 Tries to harvest and steal ftp login credentials 11->50 52 2 other signatures 11->52 20 conhost.exe 16->20         started        22 conhost.exe 18->22         started        file8 signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Outstanding Balance.exe38%VirustotalBrowse
                    Outstanding Balance.exe46%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    Outstanding Balance.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exe38%VirustotalBrowse
                    C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exe46%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    SourceDetectionScannerLabelLinkDownload
                    8.0.Outstanding Balance.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    8.0.Outstanding Balance.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    8.2.Outstanding Balance.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    8.0.Outstanding Balance.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    8.0.Outstanding Balance.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    8.0.Outstanding Balance.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://rPudMB.com0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://www.tiro.com0%URL Reputationsafe
                    https://api.ipify.org%%startupfolder%0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.fontbureau.comas0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.comm0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    https://SjVl8ze1qIuT.com0%Avira URL Cloudsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    a2plcpnl0484.prod.iad2.secureserver.net
                    198.71.236.16
                    truefalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://rPudMB.comOutstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1Outstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.apache.org/licenses/LICENSE-2.0Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.com/designers/?Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://certs.starfieldtech.com/repository/0Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://certificates.starfieldtech.com/repository/0Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers?Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://certs.starfieldtech.com/repository/1402Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://crl.starfieldtech.com/sfroot-g2.crl0LOutstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://a2plcpnl0484.prod.iad2.secureserver.netOutstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwOutstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://crl.starfieldtech.com/sfig2s1-387.crl0cOutstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.tiro.comOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://ocsp.starfieldtech.com/0;Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.fontbureau.com/designersOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://api.ipify.org%%startupfolder%Outstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                low
                                                http://www.goodfont.co.krOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.carterandcone.comlOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://ocsp.starfieldtech.com/0FOutstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sajatypeworks.comOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.typography.netDOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers/cabarga.htmlNOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fontbureau.comasOutstanding Balance.exe, 00000000.00000002.281859512.0000000001897000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.founder.com.cn/cn/cTheOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.galapagosdesign.com/staff/dennis.htmOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://fontfabrik.comOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.founder.com.cn/cnOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers/frere-jones.htmlOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.fontbureau.commOutstanding Balance.exe, 00000000.00000002.281859512.0000000001897000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.jiyu-kobo.co.jp/Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://DynDns.comDynDNSnamejidpasswordPsi/PsiOutstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.galapagosdesign.com/DPleaseOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.fontbureau.com/designers8Outstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://SjVl8ze1qIuT.comOutstanding Balance.exe, 00000008.00000002.507109922.0000000002F4F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.fonts.comOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.sandoll.co.krOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.urwpp.deDPleaseOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.zhongyicts.com.cnOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://certificates.starfieldtech.com/repository/sfig2.crt0Outstanding Balance.exe, 00000008.00000002.507128976.0000000002F57000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOutstanding Balance.exe, 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.sakkal.comOutstanding Balance.exe, 00000000.00000002.286893084.0000000007362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              https://api.ipify.org%Outstanding Balance.exe, 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              low
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              198.71.236.16
                                                              a2plcpnl0484.prod.iad2.secureserver.netUnited States
                                                              26496AS-26496-GO-DADDY-COM-LLCUSfalse
                                                              Joe Sandbox Version:34.0.0 Boulder Opal
                                                              Analysis ID:626553
                                                              Start date and time: 14/05/202212:41:082022-05-14 12:41:08 +02:00
                                                              Joe Sandbox Product:CloudBasic
                                                              Overall analysis duration:0h 9m 10s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Sample file name:Outstanding Balance.exe
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                              Number of analysed new started processes analysed:30
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • HDC enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Detection:MAL
                                                              Classification:mal100.troj.adwa.spyw.evad.winEXE@9/9@1/1
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HDC Information:
                                                              • Successful, ratio: 1.6% (good quality ratio 1.2%)
                                                              • Quality average: 61.8%
                                                              • Quality standard deviation: 40.1%
                                                              HCA Information:
                                                              • Successful, ratio: 96%
                                                              • Number of executed functions: 54
                                                              • Number of non-executed functions: 2
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Adjust boot time
                                                              • Enable AMSI
                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              TimeTypeDescription
                                                              12:42:15API Interceptor698x Sleep call for process: Outstanding Balance.exe modified
                                                              12:42:21API Interceptor39x Sleep call for process: powershell.exe modified
                                                              No context
                                                              No context
                                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                              AS-26496-GO-DADDY-COM-LLCUSNEW ORDER.exeGet hashmaliciousBrowse
                                                              • 166.62.10.145
                                                              https://znap.link/andrea.selmo-michell.comandrea.selmo-michell.comandrea.selmo-michell.comandrea.selmo-michell.comGet hashmaliciousBrowse
                                                              • 107.180.51.16
                                                              SOA.exeGet hashmaliciousBrowse
                                                              • 184.168.102.151
                                                              Rechnungs-Details 2022.12.05_1751.xlsGet hashmaliciousBrowse
                                                              • 166.62.88.34
                                                              Y81tD2Xh1sGet hashmaliciousBrowse
                                                              • 198.71.244.222
                                                              PO 2022-05-12_1207, United States.xlsGet hashmaliciousBrowse
                                                              • 166.62.88.34
                                                              RFTjA6E3AK.exeGet hashmaliciousBrowse
                                                              • 166.62.28.146
                                                              doc_65398086_4190362045539.pdf.vbsGet hashmaliciousBrowse
                                                              • 148.66.138.165
                                                              PO-19903.vbsGet hashmaliciousBrowse
                                                              • 148.66.138.165
                                                              PAYMENT COPY.exeGet hashmaliciousBrowse
                                                              • 166.62.10.145
                                                              http://ftu.eduGet hashmaliciousBrowse
                                                              • 107.180.32.184
                                                              sora.x86Get hashmaliciousBrowse
                                                              • 72.167.185.227
                                                              Purchase Order..exeGet hashmaliciousBrowse
                                                              • 184.168.102.151
                                                              SWIFT $19,300.00 7565748939937701102022.vbsGet hashmaliciousBrowse
                                                              • 166.62.10.35
                                                              22WYZdJbw5.exeGet hashmaliciousBrowse
                                                              • 160.153.78.2
                                                              Pa5BQv8oni.exeGet hashmaliciousBrowse
                                                              • 148.66.136.9
                                                              f8keZ8QG3Lw4Vvy.exeGet hashmaliciousBrowse
                                                              • 43.255.154.57
                                                              KBnGzbrjDEGet hashmaliciousBrowse
                                                              • 192.186.201.164
                                                              http://r20.rs6.net/tn.jsp?t=qcuzd54ab.0.0.sqy9yutab.0&1d=preview&r=3&p=http%3A%2F%2Fhfpauliusjcwhitegh.legasilife.co.za/nibrown@seven.com.auGet hashmaliciousBrowse
                                                              • 50.62.222.178
                                                              SOA PDA SETTLEMENT PAYMENT.exeGet hashmaliciousBrowse
                                                              • 184.168.102.151
                                                              No context
                                                              No context
                                                              Process:C:\Users\user\Desktop\Outstanding Balance.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:modified
                                                              Size (bytes):1308
                                                              Entropy (8bit):5.345811588615766
                                                              Encrypted:false
                                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                              MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                              SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                              SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                              SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                              Malicious:true
                                                              Reputation:high, very likely benign file
                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):22296
                                                              Entropy (8bit):5.603624646187698
                                                              Encrypted:false
                                                              SSDEEP:384:btMjDLG0pe7XVyXkuJWMSBKn0jultInz7Y9gwSJ3xqT1MRvZlbAV7UEWyuZBDI+K:Sk7kkg74K0CltATwcACdfwIbVY
                                                              MD5:F7067012D89623965900C355CE433316
                                                              SHA1:470645ABA3583A61B2F2444229690101C1201C4D
                                                              SHA-256:D90C559DBB5837E3C36D6EAC09673DEA4BDDF6083228CCA1247120EEBAC61583
                                                              SHA-512:A3F07307B5D30D3AB5CC9332155C649DF664F4A14BC6C03EF4955C8E954C1E81F022E48146600A8FF1F1960C4B3774093FA2CD3344E51B74FFFCA510CAB56986
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:@...e...........~.......m.................N..........@..........H...............<@.^.L."My...:P..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.4................Zg5..:O..g..q..........System.Xml..@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:very short file (no magic)
                                                              Category:dropped
                                                              Size (bytes):1
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3:U:U
                                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                              Malicious:false
                                                              Reputation:high, very likely benign file
                                                              Preview:1
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:very short file (no magic)
                                                              Category:dropped
                                                              Size (bytes):1
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3:U:U
                                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                              Malicious:false
                                                              Reputation:high, very likely benign file
                                                              Preview:1
                                                              Process:C:\Users\user\Desktop\Outstanding Balance.exe
                                                              File Type:XML 1.0 document, ASCII text
                                                              Category:dropped
                                                              Size (bytes):1601
                                                              Entropy (8bit):5.156785335024275
                                                              Encrypted:false
                                                              SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtVPxvn:cge4MYrFdOFzOzN33ODOiDdKrsuT3v
                                                              MD5:1FBBB2E42507D965CC0791CED2B9F75A
                                                              SHA1:46C6F95A764C756503D375AA7A1A1CCA83BA396D
                                                              SHA-256:CCCD3A32FB4D24036890559329D13368FE54302D1FF1444A265989F880209BEB
                                                              SHA-512:126FA7CF12F0A5ED7BDF22036CE3B2B0C780DB09A201106FFB2B5D57F49CC75C810DA6C1348B3E19D27AB469FB859E2EB6C552223766FF5E6E7F7859025328D6
                                                              Malicious:true
                                                              Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                              Process:C:\Users\user\Desktop\Outstanding Balance.exe
                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):693760
                                                              Entropy (8bit):7.7556286808273915
                                                              Encrypted:false
                                                              SSDEEP:12288:A9H5prddKPgqiIjfo2E0+mSVZJWX5f/760uc0h:sHvvILvImSO5sP
                                                              MD5:EDDB51444437EBE5E42164DD30EA5759
                                                              SHA1:DCAC53C6BADD60C7B042067D496B4E589EB3F49E
                                                              SHA-256:A1D11129A5202DEC1927642F82F5D766217D8ABFB00FA88C79E9266CBDCB4F08
                                                              SHA-512:0ADEB9290F07CC9CAF94232437D5AF713E994F40114297763FBF779682B3486FEC9B187ED87ECBF7582D19F3FCF0B1C7BA273DD6A6BE5490DD923005B17DC599
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                              • Antivirus: Virustotal, Detection: 38%, Browse
                                                              • Antivirus: ReversingLabs, Detection: 46%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-.}b..............0..T...@.......r... ........@.. ....................................@..................................r..K.......(<..........................Kr............................................... ............... ..H............text....R... ...T.................. ..`.rsrc...(<.......>...V..............@..@.reloc..............................@..B.................r......H....... ...............4..c<...........................................~....(n...8.....(....8.....*..~....(n...8.......0..r.......8J.......E....]...8X.....9....8<....~......8....8:... ....(....9....& ....8.....~.........8.....s.........8......*...0..........8........E....................;...........'...)..."...t...............8.....~.....o..... ....~....(r...o....8J....~.....o...... ....~....(r...o....8.....~.....o..... x...~....(r...o....8.....~.....o...... ....~....(r...o
                                                              Process:C:\Users\user\Desktop\Outstanding Balance.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):26
                                                              Entropy (8bit):3.95006375643621
                                                              Encrypted:false
                                                              SSDEEP:3:ggPYV:rPYV
                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                              Malicious:true
                                                              Preview:[ZoneTransfer]....ZoneId=0
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):5805
                                                              Entropy (8bit):5.418630612537122
                                                              Encrypted:false
                                                              SSDEEP:96:BZyhjNoqDo1ZFZVhjNoqDo1Z/qvYvCvjZahjNoqDo1ZYjvSvSvwZn:dQqAaaK
                                                              MD5:11A56BB03516338D836F35840F4C2C86
                                                              SHA1:164C5D564A5133722EE7DE7A7AABEFD440D4B977
                                                              SHA-256:CD2D18544B2F5055A49DC4868D6ED4CDE98EFD6DDFF5DEC8C6B4BEA09999DEE4
                                                              SHA-512:4AEE9B6C6C2C6A30E60D1F839EAC69173F8E91987E967B94B66E1AA8412C13373FF5647C1597883D53B911D570DCA83BB24BB5011A2872AE1B22897020255573
                                                              Malicious:false
                                                              Preview:.**********************..Windows PowerShell transcript start..Start time: 20220514124221..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 414408 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exe..Process ID: 6900..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220514124221..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exe..**********************..Windows PowerShell transcript start..Start time: 20220514124600..Username: computer\user..RunAs User: DESKTOP-716T
                                                              Process:C:\Users\user\Desktop\Outstanding Balance.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:modified
                                                              Size (bytes):835
                                                              Entropy (8bit):4.694294591169137
                                                              Encrypted:false
                                                              SSDEEP:24:QWDZh+ragzMZfuMMs1L/JU5fFCkK8T1rTt8:vDZhyoZWM9rU5fFcP
                                                              MD5:6EB47C1CF858E25486E42440074917F2
                                                              SHA1:6A63F93A95E1AE831C393A97158C526A4FA0FAAE
                                                              SHA-256:9B13A3EA948A1071A81787AAC1930B89E30DF22CE13F8FF751F31B5D83E79FFB
                                                              SHA-512:08437AB32E7E905EB11335E670CDD5D999803390710ED39CBC31A2D3F05868D5D0E5D051CCD7B06A85BB466932F99A220463D27FAC29116D241E8ADAC495FA2F
                                                              Malicious:true
                                                              Preview:# Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....127.0.0.1
                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Entropy (8bit):7.7556286808273915
                                                              TrID:
                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                                              • DOS Executable Generic (2002/1) 0.01%
                                                              File name:Outstanding Balance.exe
                                                              File size:693760
                                                              MD5:eddb51444437ebe5e42164dd30ea5759
                                                              SHA1:dcac53c6badd60c7b042067d496b4e589eb3f49e
                                                              SHA256:a1d11129a5202dec1927642f82f5d766217d8abfb00fa88c79e9266cbdcb4f08
                                                              SHA512:0adeb9290f07cc9caf94232437d5af713e994f40114297763fbf779682b3486fec9b187ed87ecbf7582d19f3fcf0b1c7ba273dd6a6be5490dd923005b17dc599
                                                              SSDEEP:12288:A9H5prddKPgqiIjfo2E0+mSVZJWX5f/760uc0h:sHvvILvImSO5sP
                                                              TLSH:5CE4F17EF5E78E22C72913B1C0D2190453709606E673E7DB2A8251EA8E037D7AD46F87
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...-.}b..............0..T...@.......r... ........@.. ....................................@................................
                                                              Icon Hash:d4a8989ae8ccb6cc
                                                              Entrypoint:0x4a72ee
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
                                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                              Time Stamp:0x627DE32D [Fri May 13 04:48:45 2022 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:v4.0.30319
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                              Instruction
                                                              jmp dword ptr [00402000h]
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa72a00x4b.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x3c28.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0xa724b0x1c.text
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x20000xa52f40xa5400False0.874558256902data7.76149518015IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                              .rsrc0xa80000x3c280x3e00False0.928931451613data7.66098323988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xac0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountry
                                                              RT_ICON0xa80e80x37d6PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                              RT_GROUP_ICON0xab8c00x14data
                                                              RT_VERSION0xab8d40x354data
                                                              DLLImport
                                                              mscoree.dll_CorExeMain
                                                              DescriptionData
                                                              Translation0x0000 0x04b0
                                                              LegalCopyrightCopyright 2017
                                                              Assembly Version1.0.0.0
                                                              InternalNameCMSASSEMBLYREFERENCEF.exe
                                                              FileVersion1.0.0.0
                                                              CompanyName
                                                              LegalTrademarks
                                                              Comments
                                                              ProductNameResetEvent
                                                              ProductVersion1.0.0.0
                                                              FileDescriptionResetEvent
                                                              OriginalFilenameCMSASSEMBLYREFERENCEF.exe
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              May 14, 2022 12:42:40.291388035 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:40.426141977 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:40.426299095 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:40.609477997 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:40.610538006 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:40.745527983 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:40.746454954 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:40.888582945 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:41.058197975 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:41.208798885 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:41.208842039 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:41.208857059 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:41.209027052 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:41.262794018 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:41.399804115 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:41.594537973 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:41.735692024 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:41.870846987 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:41.872344971 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:42.007720947 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:42.008497000 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:42.155780077 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:42.156829119 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:42.292299986 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:42.292810917 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:42.467844009 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:42.491977930 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:42.494766951 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:42.629590988 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:42.630548000 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:42.630693913 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:42.632685900 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:42.632708073 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:42:42.765269041 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:42.765324116 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:42.767417908 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:42.792017937 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:42:42.891418934 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:44:19.634708881 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:44:19.772928953 CEST58749745198.71.236.16192.168.2.3
                                                              May 14, 2022 12:44:19.773036957 CEST49745587192.168.2.3198.71.236.16
                                                              May 14, 2022 12:44:19.775599003 CEST49745587192.168.2.3198.71.236.16
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              May 14, 2022 12:42:40.122219086 CEST5772353192.168.2.38.8.8.8
                                                              May 14, 2022 12:42:40.151422977 CEST53577238.8.8.8192.168.2.3
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                              May 14, 2022 12:42:40.122219086 CEST192.168.2.38.8.8.80xab69Standard query (0)a2plcpnl0484.prod.iad2.secureserver.netA (IP address)IN (0x0001)
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                              May 14, 2022 12:42:40.151422977 CEST8.8.8.8192.168.2.30xab69No error (0)a2plcpnl0484.prod.iad2.secureserver.net198.71.236.16A (IP address)IN (0x0001)
                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                              May 14, 2022 12:42:40.609477997 CEST58749745198.71.236.16192.168.2.3220-a2plcpnl0484.prod.iad2.secureserver.net ESMTP Exim 4.94.2 #2 Sat, 14 May 2022 03:42:40 -0700
                                                              220-We do not authorize the use of this system to transport unsolicited,
                                                              220 and/or bulk e-mail.
                                                              May 14, 2022 12:42:40.610538006 CEST49745587192.168.2.3198.71.236.16EHLO 414408
                                                              May 14, 2022 12:42:40.745527983 CEST58749745198.71.236.16192.168.2.3250-a2plcpnl0484.prod.iad2.secureserver.net Hello 414408 [102.129.143.55]
                                                              250-SIZE 52428800
                                                              250-8BITMIME
                                                              250-PIPELINING
                                                              250-PIPE_CONNECT
                                                              250-AUTH PLAIN LOGIN
                                                              250-CHUNKING
                                                              250-STARTTLS
                                                              250-SMTPUTF8
                                                              250 HELP
                                                              May 14, 2022 12:42:40.746454954 CEST49745587192.168.2.3198.71.236.16STARTTLS
                                                              May 14, 2022 12:42:40.888582945 CEST58749745198.71.236.16192.168.2.3220 TLS go ahead

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:12:42:06
                                                              Start date:14/05/2022
                                                              Path:C:\Users\user\Desktop\Outstanding Balance.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\Outstanding Balance.exe"
                                                              Imagebase:0xe50000
                                                              File size:693760 bytes
                                                              MD5 hash:EDDB51444437EBE5E42164DD30EA5759
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.282083109.00000000031D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.284064952.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.284064952.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low

                                                              Target ID:4
                                                              Start time:12:42:18
                                                              Start date:14/05/2022
                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\wBKXRefcPdWgIF.exe
                                                              Imagebase:0x1230000
                                                              File size:430592 bytes
                                                              MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Reputation:high

                                                              Target ID:5
                                                              Start time:12:42:19
                                                              Start date:14/05/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7c9170000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:6
                                                              Start time:12:42:19
                                                              Start date:14/05/2022
                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wBKXRefcPdWgIF" /XML "C:\Users\user\AppData\Local\Temp\tmp2F3E.tmp
                                                              Imagebase:0x280000
                                                              File size:185856 bytes
                                                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:7
                                                              Start time:12:42:20
                                                              Start date:14/05/2022
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7c9170000
                                                              File size:625664 bytes
                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high

                                                              Target ID:8
                                                              Start time:12:42:23
                                                              Start date:14/05/2022
                                                              Path:C:\Users\user\Desktop\Outstanding Balance.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Users\user\Desktop\Outstanding Balance.exe
                                                              Imagebase:0x870000
                                                              File size:693760 bytes
                                                              MD5 hash:EDDB51444437EBE5E42164DD30EA5759
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:.Net C# or VB.NET
                                                              Yara matches:
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.278451114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.278451114.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.504676152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000002.504676152.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.279068177.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.279068177.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.277927770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.277927770.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.506715989.0000000002BF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000000.276115153.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000000.276115153.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:9.7%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:44
                                                                Total number of Limit Nodes:2
                                                                execution_graph 9754 314de90 9755 314ded2 9754->9755 9757 314ded9 9754->9757 9756 314df2a CallWindowProcW 9755->9756 9755->9757 9756->9757 9758 3143f98 9759 3143fb2 9758->9759 9770 3145570 9759->9770 9760 3143fbd 9764 3143760 9760->9764 9765 314376b 9764->9765 9766 3145570 CreateActCtxA 9765->9766 9767 3148376 9766->9767 9774 314866b 9767->9774 9768 314839a 9771 3145580 9770->9771 9772 3145590 9771->9772 9793 3145658 9771->9793 9772->9760 9775 314868f 9774->9775 9779 31486b0 9775->9779 9783 31486c0 9775->9783 9776 314869f 9776->9768 9780 31486c0 9779->9780 9781 31486f4 9780->9781 9787 3148748 9780->9787 9781->9776 9784 31486d7 9783->9784 9785 31486f4 9784->9785 9786 3148748 CreateActCtxA 9784->9786 9785->9776 9786->9785 9788 3148768 9787->9788 9789 3145570 CreateActCtxA 9788->9789 9790 3148778 9789->9790 9791 3145570 CreateActCtxA 9790->9791 9792 3148786 9791->9792 9792->9781 9794 3145666 9793->9794 9796 31456d8 9793->9796 9799 3145b58 9794->9799 9803 3145b48 9794->9803 9796->9772 9801 3145b7f 9799->9801 9800 3145c5c 9800->9800 9801->9800 9807 31457dc 9801->9807 9805 3145b52 9803->9805 9804 3145c5c 9804->9804 9805->9804 9806 31457dc CreateActCtxA 9805->9806 9806->9804 9808 3146be8 CreateActCtxA 9807->9808 9810 3146cab 9808->9810

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 3144360-3144381 1 3144383 0->1 2 3144388-314447f 0->2 1->2 4 3144485-31445e4 2->4 5 3144b97-3144bbf 2->5 49 3144b5d-3144b87 4->49 50 31445ea-3144645 4->50 8 31452b7-31452c0 5->8 10 31452c6-31452dd 8->10 11 3144bcd-3144bd6 8->11 12 3144bdd-3144cd1 11->12 13 3144bd8 11->13 32 3144cd3-3144cdf 12->32 33 3144cfb 12->33 13->12 34 3144ce1-3144ce7 32->34 35 3144ce9-3144cef 32->35 36 3144d01-3144d21 33->36 38 3144cf9 34->38 35->38 40 3144d81-3144dfb 36->40 41 3144d23-3144d7c 36->41 38->36 60 3144e52-3144e95 40->60 61 3144dfd-3144e50 40->61 54 31452b4 41->54 63 3144b94 49->63 64 3144b89 49->64 57 3144647 50->57 58 314464a-3144655 50->58 54->8 57->58 62 3144a6f-3144a75 58->62 91 3144ea0-3144ea9 60->91 61->91 65 314465a-3144678 62->65 66 3144a7b-3144af8 62->66 63->5 64->63 68 31446cf-31446e4 65->68 69 314467a-314467e 65->69 104 3144b47-3144b4d 66->104 73 31446e6 68->73 74 31446eb-3144701 68->74 69->68 71 3144680-314468b 69->71 78 31446c1-31446c7 71->78 73->74 75 3144703 74->75 76 3144708-314471f 74->76 75->76 80 3144726-314473c 76->80 81 3144721 76->81 83 314468d-3144691 78->83 84 31446c9-31446ca 78->84 87 3144743-314474a 80->87 88 314473e 80->88 81->80 85 3144697-31446af 83->85 86 3144693 83->86 90 314474d-3144973 84->90 93 31446b6-31446be 85->93 94 31446b1 85->94 86->85 87->90 88->87 101 3144975-3144979 90->101 102 31449d7-31449ec 90->102 92 3144f09-3144f18 91->92 96 3144f1a-3144fa2 92->96 97 3144eab-3144ed3 92->97 93->78 94->93 132 3145127-3145130 96->132 99 3144ed5 97->99 100 3144eda-3144f03 97->100 99->100 100->92 101->102 108 314497b-314498a 101->108 105 31449f3-3144a14 102->105 106 31449ee 102->106 111 3144b4f-3144b55 104->111 112 3144afa-3144b44 104->112 113 3144a16 105->113 114 3144a1b-3144a3a 105->114 106->105 109 31449c9-31449cf 108->109 115 31449d1-31449d2 109->115 116 314498c-3144990 109->116 111->49 112->104 113->114 118 3144a41-3144a61 114->118 119 3144a3c 114->119 126 3144a6c 115->126 120 3144992-3144996 116->120 121 314499a-31449bb 116->121 123 3144a63 118->123 124 3144a68 118->124 119->118 120->121 127 31449c2-31449c6 121->127 128 31449bd 121->128 123->124 124->126 126->62 127->109 128->127 134 3145136-3145191 132->134 135 3144fa7-3144fbc 132->135 150 3145193-31451c6 134->150 151 31451c8-31451f2 134->151 136 3144fc5-314511b 135->136 137 3144fbe 135->137 155 3145121 136->155 137->136 139 3145055-3145095 137->139 140 3145010-3145050 137->140 141 314509a-31450da 137->141 142 3144fcb-314500b 137->142 139->155 140->155 141->155 142->155 159 31451fb-31452ad 150->159 151->159 155->132 159->54
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281878681.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_3140000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: .^As$N~`%$UUUU
                                                                • API String ID: 0-2750224043
                                                                • Opcode ID: 3a9d9f42536de4d8662f0c611a97d53206d61906e49506df9b14a82512740324
                                                                • Instruction ID: 4a7314b8785d8fdcc2f10dd74f759a480dc3d907ec932af3565a3f1a31185f81
                                                                • Opcode Fuzzy Hash: 3a9d9f42536de4d8662f0c611a97d53206d61906e49506df9b14a82512740324
                                                                • Instruction Fuzzy Hash: 4EA2A175A00628CFDB64CF69C984BD9BBB2FF89304F1581E9D509AB225DB319E81CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 182 3146bdf-3146be1 183 3146be3-3146bf9 182->183 184 3146bfc-3146ca9 CreateActCtxA 182->184 183->184 186 3146cb2-3146d0c 184->186 187 3146cab-3146cb1 184->187 194 3146d0e-3146d11 186->194 195 3146d1b-3146d1f 186->195 187->186 194->195 196 3146d30 195->196 197 3146d21-3146d2d 195->197 199 3146d31 196->199 197->196 199->199
                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 03146C99
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281878681.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_3140000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: 8b42a515e8ea65670ef5908a56bb9f06e7fac25a7456dac5edd41238d094c9ef
                                                                • Instruction ID: bb9a12e3b4f5d217f1261dca5875de515a4632b01f3bbf9434bce19a85395d59
                                                                • Opcode Fuzzy Hash: 8b42a515e8ea65670ef5908a56bb9f06e7fac25a7456dac5edd41238d094c9ef
                                                                • Instruction Fuzzy Hash: 6641E2B1C00618CFDB24DFA9C8447DEBBB1BF89308F25816AD419BB251DB755949CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 164 31457dc-3146ca9 CreateActCtxA 168 3146cb2-3146d0c 164->168 169 3146cab-3146cb1 164->169 176 3146d0e-3146d11 168->176 177 3146d1b-3146d1f 168->177 169->168 176->177 178 3146d30 177->178 179 3146d21-3146d2d 177->179 181 3146d31 178->181 179->178 181->181
                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 03146C99
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281878681.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_3140000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID:
                                                                • API String ID: 2289755597-0
                                                                • Opcode ID: c7869dbbfe5c438d0133ca22d9b33e71ca5c10ffe8b1d05106a8c80ddd547d9c
                                                                • Instruction ID: 6ff073e7dd1a35185b96bdf7612e59e277bb420eada3cc8f554d43b3b6dde11a
                                                                • Opcode Fuzzy Hash: c7869dbbfe5c438d0133ca22d9b33e71ca5c10ffe8b1d05106a8c80ddd547d9c
                                                                • Instruction Fuzzy Hash: 1941F170C04618CFDB24DFA9C844BDEBBB1BF49308F25806AD409BB251DB756949CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 200 314de90-314decc 201 314ded2-314ded7 200->201 202 314df7c-314df9c 200->202 203 314ded9-314df10 201->203 204 314df2a-314df62 CallWindowProcW 201->204 209 314df9f-314dfac 202->209 210 314df12-314df18 203->210 211 314df19-314df28 203->211 205 314df64-314df6a 204->205 206 314df6b-314df7a 204->206 205->206 206->209 210->211 211->209
                                                                APIs
                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 0314DF51
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281878681.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_3140000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: CallProcWindow
                                                                • String ID:
                                                                • API String ID: 2714655100-0
                                                                • Opcode ID: 789ba1f524e12e92a964cee1ff93febaa99f13ddf2b4d38ba0f845adccae0c15
                                                                • Instruction ID: 0f350cac20b182e5587ce227378a22bdb08bca08cac4c9342174dbed79fd87f2
                                                                • Opcode Fuzzy Hash: 789ba1f524e12e92a964cee1ff93febaa99f13ddf2b4d38ba0f845adccae0c15
                                                                • Instruction Fuzzy Hash: 644129B4A00745CFCB14CF99C448AAABBF5FF8D314F298499E519AB321D774A845CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 769 14bd4d8-14bd4ea 770 14bd57e-14bd585 769->770 771 14bd4f0 769->771 772 14bd4f2-14bd4fe 770->772 771->772 774 14bd58a-14bd58f 772->774 775 14bd504-14bd526 772->775 774->775 776 14bd528-14bd546 775->776 777 14bd594-14bd5a9 775->777 780 14bd54e-14bd55e 776->780 781 14bd560-14bd568 777->781 780->781 782 14bd5b6 780->782 783 14bd5ab-14bd5b4 781->783 784 14bd56a-14bd57b 781->784 783->784
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281574059.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_14bd000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: abaa8c50d3e339be92af51497377c4364ffa616de71bdb35989defc05dd995a8
                                                                • Instruction ID: d3169ff1492b5b0300b0237b0bf2b57aff3ce9c6aecf50b020d0756cd00f7569
                                                                • Opcode Fuzzy Hash: abaa8c50d3e339be92af51497377c4364ffa616de71bdb35989defc05dd995a8
                                                                • Instruction Fuzzy Hash: 6121F8B1904240DFDB05DF54D9C0B97BB65FB8832CF2485AAE9054B366C336D856C7B1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 752 14bd3ec-14bd3fe 753 14bd492-14bd499 752->753 754 14bd404 752->754 755 14bd406-14bd412 753->755 754->755 756 14bd418-14bd43a 755->756 757 14bd49e-14bd4a3 755->757 759 14bd4a8-14bd4bd 756->759 760 14bd43c-14bd45a 756->760 757->756 764 14bd474-14bd47c 759->764 762 14bd462-14bd472 760->762 762->764 765 14bd4ca 762->765 766 14bd4bf-14bd4c8 764->766 767 14bd47e-14bd48f 764->767 766->767
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281574059.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_14bd000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a6c374d280dc35951e6bc5c51fa0ecac323c3826d2c781e0a9bac35ced38ff46
                                                                • Instruction ID: ae759ffd6b323f1e4fb08d43652717ad66873833363c3e769bb79d4784b768c9
                                                                • Opcode Fuzzy Hash: a6c374d280dc35951e6bc5c51fa0ecac323c3826d2c781e0a9bac35ced38ff46
                                                                • Instruction Fuzzy Hash: 072124B1904240DFDB05DF54D9C0BA7BB65FB84328F24C6BAE9090B257C33AE806C6B1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 786 16ad01c-16ad02e 787 16ad0bd-16ad0c4 786->787 788 16ad034 786->788 789 16ad036-16ad042 787->789 788->789 790 16ad048-16ad06a 789->790 791 16ad0c9-16ad0ce 789->791 793 16ad06c-16ad08a call 314c788 790->793 794 16ad0d3-16ad0e8 790->794 791->790 797 16ad08e-16ad09d 793->797 798 16ad09f-16ad0a7 794->798 797->798 799 16ad0f5 797->799 800 16ad0ea-16ad0f3 798->800 801 16ad0a9-16ad0ba 798->801 800->801
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281705103.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_16ad000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fec4062186c896cf39ce86019ddb3ee6c46143bd491a74e66d2130b52d13161a
                                                                • Instruction ID: f228d3880f1980b341aa4cb297e356fbe3fe6ca588f530b9a929e4c0d3a511a4
                                                                • Opcode Fuzzy Hash: fec4062186c896cf39ce86019ddb3ee6c46143bd491a74e66d2130b52d13161a
                                                                • Instruction Fuzzy Hash: BB2142B1584240DFCB10DF64DCC0B26BBA1FB88354F64C569E80A4B782C336DC07CA61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 804 16ad1d4-16ad1e6 805 16ad1ec 804->805 806 16ad275-16ad27c 804->806 807 16ad1ee-16ad1fa 805->807 806->807 808 16ad200-16ad222 807->808 809 16ad281-16ad286 807->809 811 16ad28b-16ad2a0 808->811 812 16ad224-16ad23e 808->812 809->808 816 16ad257-16ad25f 811->816 815 16ad246-16ad255 812->815 815->816 817 16ad2ad 815->817 818 16ad2a2-16ad2ab 816->818 819 16ad261-16ad272 816->819 818->819
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281705103.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_16ad000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4fd9687eee13bf59f1d39a4f77db90698aaf1b8163969fe8682855c0972e5037
                                                                • Instruction ID: f5678c8548f8e95a7bad564636db6d8037e9060329bc77239dda68b1ea255930
                                                                • Opcode Fuzzy Hash: 4fd9687eee13bf59f1d39a4f77db90698aaf1b8163969fe8682855c0972e5037
                                                                • Instruction Fuzzy Hash: 7D21F5B1504240EFDB01DF94D9C0B26BB65FB84328F64C6ADEA494B746C736DC46CE61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281705103.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_16ad000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2f51f342a6fa0aecc21cb36f4bdc1ffdef43c0ba0870aa3ecccecb33b8cd1d94
                                                                • Instruction ID: 1b33c3c7ad3f016cab26246f70293fa6e4b34deb3ffd6f89c0f0cd29d33930fa
                                                                • Opcode Fuzzy Hash: 2f51f342a6fa0aecc21cb36f4bdc1ffdef43c0ba0870aa3ecccecb33b8cd1d94
                                                                • Instruction Fuzzy Hash: 6D2180755483809FDB02CF14D994B11BF71EB46314F28C5DAD8458F697C33A984ACB62
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281574059.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_14bd000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4244a9aae6d80b52576d8183ab5a55eec2a15cebe5e8ad83433696fc3d306fb5
                                                                • Instruction ID: 1453a791ab72d348188449cb3295119cbacfcefbeb4b9bcf756d376c363c395b
                                                                • Opcode Fuzzy Hash: 4244a9aae6d80b52576d8183ab5a55eec2a15cebe5e8ad83433696fc3d306fb5
                                                                • Instruction Fuzzy Hash: 1811B176804280CFDB12CF54D5C4B56BF71FB84328F2486AAD8050B727C33AD45ACBA2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281574059.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_14bd000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4244a9aae6d80b52576d8183ab5a55eec2a15cebe5e8ad83433696fc3d306fb5
                                                                • Instruction ID: 2a3439222ae8a7e7a9caf5b741fba3e9afad828e0136f46a9507f01bf518274f
                                                                • Opcode Fuzzy Hash: 4244a9aae6d80b52576d8183ab5a55eec2a15cebe5e8ad83433696fc3d306fb5
                                                                • Instruction Fuzzy Hash: 1E11A276804240DFDB06CF54D5C4B96BF72FB94324F24C6AAD8090B616C33AD45ACBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281705103.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_16ad000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: dc7e01eeaf6b7fcf3c612de606988f7e81d04e4c628bf39ec0a86da91ad33e64
                                                                • Instruction ID: 222394e746da066a44d4e0d4c7198dcee9ac865080009a32c47ab9186fd083c4
                                                                • Opcode Fuzzy Hash: dc7e01eeaf6b7fcf3c612de606988f7e81d04e4c628bf39ec0a86da91ad33e64
                                                                • Instruction Fuzzy Hash: D6118B75904280DFDB12CF54D9C4B15BBB1FB84224F28C6A9D9494BB56C33AD84ACF61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281574059.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_14bd000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 966d0ec8e8c57bc1fa72fc1bad8df4014c2d17d0b7c3cc351f1aec5725dae56a
                                                                • Instruction ID: 1ceed55271204656331220a4eabbfdc508e85df210dbedaca89c57629e013535
                                                                • Opcode Fuzzy Hash: 966d0ec8e8c57bc1fa72fc1bad8df4014c2d17d0b7c3cc351f1aec5725dae56a
                                                                • Instruction Fuzzy Hash: D7014C718083C09AE7105B55CCC47E7BF98DF4123CF08859BEA040B356C3389805C671
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281574059.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_14bd000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 258d93c291f9ea3b52be643bd12a70268f10810e855c3b51c294f05d6df466e9
                                                                • Instruction ID: 7a7f97c6be9ca6c548f82d1b66d31b40b0c78a239128c0ee8099883502894570
                                                                • Opcode Fuzzy Hash: 258d93c291f9ea3b52be643bd12a70268f10810e855c3b51c294f05d6df466e9
                                                                • Instruction Fuzzy Hash: FAF068754046849BE7118E1ACCC4BA3FF98EF41738F18C49BED085B356C3755844CAB1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281878681.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_3140000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 45558f7894c1c0e132b783f9a0a010dcb7e6d2f489d8532bd1741c115131197c
                                                                • Instruction ID: 1c6dcb15b09c45b803f8e52820319414884e493c07ffd997a0c8f873763d6275
                                                                • Opcode Fuzzy Hash: 45558f7894c1c0e132b783f9a0a010dcb7e6d2f489d8532bd1741c115131197c
                                                                • Instruction Fuzzy Hash: 12715FB0A062098FD708DFBBEC91689BBF2FB85204F04C539D5149B268DF7468568F61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.281878681.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_3140000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ca74355a90ab5b363ba0be8b3a576c3c84fe939fb6d5425d27df89fd2b458434
                                                                • Instruction ID: 9530635364fab8d0815c28662adbe0d15c24dcc5ddda1cb335b9a58ef773d430
                                                                • Opcode Fuzzy Hash: ca74355a90ab5b363ba0be8b3a576c3c84fe939fb6d5425d27df89fd2b458434
                                                                • Instruction Fuzzy Hash: D76171B0A062098FD708DFBBEC9168ABBF2FBC5204F04C539D5149B268DF7468558F61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Execution Graph

                                                                Execution Coverage:12.7%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:129
                                                                Total number of Limit Nodes:7
                                                                execution_graph 37011 641c590 37012 641c5f6 37011->37012 37016 641c740 37012->37016 37019 641c750 37012->37019 37013 641c6a5 37022 641c15c 37016->37022 37020 641c77e 37019->37020 37021 641c15c DuplicateHandle 37019->37021 37020->37013 37021->37020 37023 641c7b8 DuplicateHandle 37022->37023 37024 641c77e 37023->37024 37024->37013 36875 1274560 36876 1274574 36875->36876 36879 12747aa 36876->36879 36877 127457d 36880 12747b3 36879->36880 36885 12749a6 36879->36885 36890 127498c 36879->36890 36895 127487f 36879->36895 36900 1274890 36879->36900 36880->36877 36886 12749b9 36885->36886 36887 12749cb 36885->36887 36905 1274c89 36886->36905 36910 1274c98 36886->36910 36891 127493f 36890->36891 36891->36890 36892 12749cb 36891->36892 36893 1274c89 2 API calls 36891->36893 36894 1274c98 2 API calls 36891->36894 36893->36892 36894->36892 36896 1274890 36895->36896 36897 12749cb 36896->36897 36898 1274c89 2 API calls 36896->36898 36899 1274c98 2 API calls 36896->36899 36898->36897 36899->36897 36901 12748d4 36900->36901 36902 12749cb 36901->36902 36903 1274c89 2 API calls 36901->36903 36904 1274c98 2 API calls 36901->36904 36902->36902 36903->36902 36904->36902 36906 1274c98 36905->36906 36915 1274ce8 36906->36915 36919 1274cd8 36906->36919 36907 1274cb6 36907->36887 36911 1274ca6 36910->36911 36913 1274ce8 RtlEncodePointer 36911->36913 36914 1274cd8 RtlEncodePointer 36911->36914 36912 1274cb6 36912->36887 36913->36912 36914->36912 36916 1274d22 36915->36916 36917 1274d4c RtlEncodePointer 36916->36917 36918 1274d75 36916->36918 36917->36918 36918->36907 36920 1274ce8 36919->36920 36921 1274d4c RtlEncodePointer 36920->36921 36922 1274d75 36920->36922 36921->36922 36922->36907 37025 127b4d0 37026 127b4ee 37025->37026 37029 1279e1c 37026->37029 37028 127b525 37030 127cff0 LoadLibraryA 37029->37030 37032 127d0cc 37030->37032 36923 6416208 36925 641621d 36923->36925 36924 64164fc 36925->36924 36928 64179d0 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 36925->36928 36929 6417958 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 36925->36929 36930 6417968 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 36925->36930 36932 6416ab0 36925->36932 36936 6416aa2 36925->36936 36941 6417b4b 36925->36941 36928->36925 36929->36925 36930->36925 36946 6416b69 36932->36946 36954 6416b78 36932->36954 36933 6416ad7 36933->36925 36937 6416aaa 36936->36937 36938 6416ad7 36936->36938 36939 6416b69 3 API calls 36937->36939 36940 6416b78 3 API calls 36937->36940 36938->36925 36939->36938 36940->36938 36942 6417b4c 36941->36942 36943 6417b8e 36942->36943 36944 6417e57 3 API calls 36942->36944 36945 6417e68 3 API calls 36942->36945 36943->36925 36944->36943 36945->36943 36947 6416b78 36946->36947 36949 6416bca 36947->36949 36950 6416b69 3 API calls 36947->36950 36951 6416b78 3 API calls 36947->36951 36948 6416ba2 36962 6417958 36948->36962 36972 6417968 36948->36972 36949->36933 36950->36948 36951->36948 36955 6416b8c 36954->36955 36957 6416bca 36954->36957 36958 6416b69 3 API calls 36955->36958 36959 6416b78 3 API calls 36955->36959 36956 6416ba2 36960 6417958 3 API calls 36956->36960 36961 6417968 3 API calls 36956->36961 36957->36933 36958->36956 36959->36956 36960->36957 36961->36957 36963 6417973 36962->36963 36965 641799b 36962->36965 36963->36949 36964 64179f1 36964->36949 36965->36964 36966 6417a8f 36965->36966 36969 6417a9d 36965->36969 36967 6416ab0 3 API calls 36966->36967 36968 6417a96 36967->36968 36968->36949 36969->36968 36982 6417e57 36969->36982 36987 6417e68 36969->36987 36973 6417973 36972->36973 36975 641799b 36972->36975 36973->36949 36974 64179f1 36974->36949 36975->36974 36976 6417a8f 36975->36976 36979 6417a9d 36975->36979 36977 6416ab0 3 API calls 36976->36977 36978 6417a96 36977->36978 36978->36949 36979->36978 36980 6417e57 3 API calls 36979->36980 36981 6417e68 3 API calls 36979->36981 36980->36978 36981->36978 36983 6417e68 36982->36983 36991 6417e91 36983->36991 36999 6417ea0 36983->36999 36984 6417e76 36984->36968 36989 6417e91 2 API calls 36987->36989 36990 6417ea0 2 API calls 36987->36990 36988 6417e76 36988->36968 36989->36988 36990->36988 36992 6417ea0 36991->36992 36993 6417ead 36992->36993 37007 6416850 36992->37007 36993->36984 36995 6417ef6 36995->36984 36997 6417fbe GlobalMemoryStatusEx 36998 6417fee 36997->36998 36998->36984 37000 6417ed5 36999->37000 37001 6417ead 36999->37001 37002 6416850 GlobalMemoryStatusEx 37000->37002 37001->36984 37004 6417ef2 37002->37004 37003 6417ef6 37003->36984 37004->37003 37005 6417fbe GlobalMemoryStatusEx 37004->37005 37006 6417fee 37005->37006 37006->36984 37008 6417f78 GlobalMemoryStatusEx 37007->37008 37010 6417ef2 37008->37010 37010->36995 37010->36997
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 178f328fec347fb57f305e8bdf510f8498c0f3ec6092eba0e61426e9b5c8655a
                                                                • Instruction ID: 5db6f7a20bdfd4833a41e3a481b362c57c6161ee577f5321a28f8dff9b307184
                                                                • Opcode Fuzzy Hash: 178f328fec347fb57f305e8bdf510f8498c0f3ec6092eba0e61426e9b5c8655a
                                                                • Instruction Fuzzy Hash: B763FF30D2061A8ECB50EF68C884A99F7B1FF95310F15D79AE45877221EB70AAC4CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5bda88e648ad8fbfe160b612afc24891e3f89934b6803bccc001aa50dfa6c02b
                                                                • Instruction ID: 46caf8936c0595d22f09d7f9a96bc1b8f8d36ee4bb79bdecbe705225d8bdd2a0
                                                                • Opcode Fuzzy Hash: 5bda88e648ad8fbfe160b612afc24891e3f89934b6803bccc001aa50dfa6c02b
                                                                • Instruction Fuzzy Hash: 2B530031D1071A8ECB51EF68C884699F7B1FF96310F15C69AE458B7221EB70AAC4CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4cc975b356d3dc270aa14cd5acd05fa0a51bb2c0270c83add4cd02eb3a877ea3
                                                                • Instruction ID: 58cc61d0fe77ff292769d54b172c9f3db8465b17d4be4373e74aa5ee72e2791a
                                                                • Opcode Fuzzy Hash: 4cc975b356d3dc270aa14cd5acd05fa0a51bb2c0270c83add4cd02eb3a877ea3
                                                                • Instruction Fuzzy Hash: 4182C031B102059FDF54DBA8C854BAEBBA2EFC9344F158969E905EB391DB34DC01CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ee3b532e44c29f01f14c09b6557da797ba1e786e5fbf0430b17df163da7c8021
                                                                • Instruction ID: a6fc49c05d06d6853a12ecf01113d042fd43f6891d7a676844d9ef76b3e3a573
                                                                • Opcode Fuzzy Hash: ee3b532e44c29f01f14c09b6557da797ba1e786e5fbf0430b17df163da7c8021
                                                                • Instruction Fuzzy Hash: B932A130E142498FDFA4DBA4C5957AEB7A2EF86308F14C469E809DF396CB70D845CB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 38fd133c61c83599e9085e9368733687dadddb36e4c50f5dd1f44490e0de8694
                                                                • Instruction ID: 56e7ede11cfe89e09f204276939866b6b972c7ff034535496132cc4abfe394fe
                                                                • Opcode Fuzzy Hash: 38fd133c61c83599e9085e9368733687dadddb36e4c50f5dd1f44490e0de8694
                                                                • Instruction Fuzzy Hash: 8902AF30E102159FCF50EFB8C944AADB7B2AF88314F168565D855EB395EB30DC42CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1351 6417ea0-6417eab 1352 6417ed5-6417ef4 call 6416850 1351->1352 1353 6417ead-6417ed4 1351->1353 1358 6417ef6-6417ef9 1352->1358 1359 6417efa-6417f59 1352->1359 1366 6417f5b-6417f5e 1359->1366 1367 6417f5f-6417fec GlobalMemoryStatusEx 1359->1367 1371 6417ff5-641801d 1367->1371 1372 6417fee-6417ff4 1367->1372 1372->1371
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508203066.0000000006410000.00000040.00000800.00020000.00000000.sdmp, Offset: 06410000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6410000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 54fe23c2190c287909e7a0cf6217f0fcea96c5f42b0d0d44cc52abda20e8c847
                                                                • Instruction ID: 2dc5369c3395a6203dd2c8ff0eb517bf0396b175a7edfadf98a1a0093b32c2d5
                                                                • Opcode Fuzzy Hash: 54fe23c2190c287909e7a0cf6217f0fcea96c5f42b0d0d44cc52abda20e8c847
                                                                • Instruction Fuzzy Hash: B0412471E043458FCB00DFB6C8042EEBBB5EF89220F15856BE418AB241EB349845CBE1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1375 127cfe4-127d047 1376 127d080-127d0ca LoadLibraryA 1375->1376 1377 127d049-127d053 1375->1377 1384 127d0d3-127d104 1376->1384 1385 127d0cc-127d0d2 1376->1385 1377->1376 1378 127d055-127d057 1377->1378 1379 127d07a-127d07d 1378->1379 1380 127d059-127d063 1378->1380 1379->1376 1382 127d067-127d076 1380->1382 1383 127d065 1380->1383 1382->1382 1387 127d078 1382->1387 1383->1382 1388 127d106-127d10a 1384->1388 1389 127d114 1384->1389 1385->1384 1387->1379 1388->1389 1391 127d10c 1388->1391 1392 127d115 1389->1392 1391->1389 1392->1392
                                                                APIs
                                                                • LoadLibraryA.KERNELBASE(?), ref: 0127D0BA
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.506422396.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_1270000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: a6f3e1c9cfbf663696254df141cf61cabda2ac532260fb5a6cef52f46fbe8044
                                                                • Instruction ID: 90e98e07dadd890b805dd438ff77e666d53ff554811a81bf88e9227366414d27
                                                                • Opcode Fuzzy Hash: a6f3e1c9cfbf663696254df141cf61cabda2ac532260fb5a6cef52f46fbe8044
                                                                • Instruction Fuzzy Hash: 1F3143B0D142899FDB14CFA8D88579EBFF1BF08314F14812AE815AB340D7759486CF92
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1393 1279e1c-127d047 1395 127d080-127d0ca LoadLibraryA 1393->1395 1396 127d049-127d053 1393->1396 1403 127d0d3-127d104 1395->1403 1404 127d0cc-127d0d2 1395->1404 1396->1395 1397 127d055-127d057 1396->1397 1398 127d07a-127d07d 1397->1398 1399 127d059-127d063 1397->1399 1398->1395 1401 127d067-127d076 1399->1401 1402 127d065 1399->1402 1401->1401 1406 127d078 1401->1406 1402->1401 1407 127d106-127d10a 1403->1407 1408 127d114 1403->1408 1404->1403 1406->1398 1407->1408 1410 127d10c 1407->1410 1411 127d115 1408->1411 1410->1408 1411->1411
                                                                APIs
                                                                • LoadLibraryA.KERNELBASE(?), ref: 0127D0BA
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.506422396.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_1270000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: b910ef03821e190fa1745629a122213fa75eef40ace7d490d6b2ec8f5bb50fff
                                                                • Instruction ID: 82f34bdbeb0c3c1ce802c08bdbf474a872be6ab97c714f769a7a8091c5bbabd8
                                                                • Opcode Fuzzy Hash: b910ef03821e190fa1745629a122213fa75eef40ace7d490d6b2ec8f5bb50fff
                                                                • Instruction Fuzzy Hash: D03144B0D2424D8FDB14CFA9C88579EBBF1BF08314F14812AE915A7340EB759446CF92
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2031 641c15c-641c84c DuplicateHandle 2033 641c855-641c872 2031->2033 2034 641c84e-641c854 2031->2034 2034->2033
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0641C77E,?,?,?,?,?), ref: 0641C83F
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508203066.0000000006410000.00000040.00000800.00020000.00000000.sdmp, Offset: 06410000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6410000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: 74314493b8f6c20744235657c4f697b729016f89a2fd9443a29698072c65a057
                                                                • Instruction ID: ae8ed5152a8acc47dbf82ca85878e06aeb698f5beb0e319b6397bd46963fb557
                                                                • Opcode Fuzzy Hash: 74314493b8f6c20744235657c4f697b729016f89a2fd9443a29698072c65a057
                                                                • Instruction Fuzzy Hash: F821E5B5D002489FDB10CF99D984ADEBBF8EB48324F15841AE914A7310D378A944CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2037 641c7b2-641c7b3 2038 641c7b8-641c84c DuplicateHandle 2037->2038 2039 641c855-641c872 2038->2039 2040 641c84e-641c854 2038->2040 2040->2039
                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0641C77E,?,?,?,?,?), ref: 0641C83F
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508203066.0000000006410000.00000040.00000800.00020000.00000000.sdmp, Offset: 06410000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6410000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID:
                                                                • API String ID: 3793708945-0
                                                                • Opcode ID: f99263ce4f6431a0b6caeef0a4c7d5d145ea3de699587fbc97b5dbd2f887c9ce
                                                                • Instruction ID: f5b533709b84788f897cf605b10820309e73eca7cadf482d45a1584457a36755
                                                                • Opcode Fuzzy Hash: f99263ce4f6431a0b6caeef0a4c7d5d145ea3de699587fbc97b5dbd2f887c9ce
                                                                • Instruction Fuzzy Hash: 2021B3B5D002589FDB10CFAAD984ADEBBF8FB48324F15841AE914A7310D378A944DFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2043 6417f70-6417fb6 2045 6417fbe-6417fec GlobalMemoryStatusEx 2043->2045 2046 6417ff5-641801d 2045->2046 2047 6417fee-6417ff4 2045->2047 2047->2046
                                                                APIs
                                                                • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06417EF2), ref: 06417FDF
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508203066.0000000006410000.00000040.00000800.00020000.00000000.sdmp, Offset: 06410000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6410000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: GlobalMemoryStatus
                                                                • String ID:
                                                                • API String ID: 1890195054-0
                                                                • Opcode ID: a9071e442db8b7bec1c00e7603a00c6c6d372272ccdf6855edbce5b25e8d6b50
                                                                • Instruction ID: 09f905f3c7507d01cb8eaf4346e8b6d55d62a4587e8f3323e3a85a59ed298563
                                                                • Opcode Fuzzy Hash: a9071e442db8b7bec1c00e7603a00c6c6d372272ccdf6855edbce5b25e8d6b50
                                                                • Instruction Fuzzy Hash: 4C1117B1C006599BCB10DF9AC844BDEFBB4EF48224F15816AE514B7240D778A945CFE1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2142 1274cd8-1274d2a 2146 1274d30 2142->2146 2147 1274d2c-1274d2e 2142->2147 2148 1274d35-1274d40 2146->2148 2147->2148 2149 1274d42-1274d73 RtlEncodePointer 2148->2149 2150 1274da1-1274dae 2148->2150 2152 1274d75-1274d7b 2149->2152 2153 1274d7c-1274d9c 2149->2153 2152->2153 2153->2150
                                                                APIs
                                                                • RtlEncodePointer.NTDLL(00000000), ref: 01274D62
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.506422396.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_1270000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: EncodePointer
                                                                • String ID:
                                                                • API String ID: 2118026453-0
                                                                • Opcode ID: 9a4249985de8491e32ebc4b4b94c7338253cdb112d3e26cd9ac73736999298e1
                                                                • Instruction ID: de96a28d30256d952e5d87e6534c83d679c2997f89ff45586a7c657adc7f14ae
                                                                • Opcode Fuzzy Hash: 9a4249985de8491e32ebc4b4b94c7338253cdb112d3e26cd9ac73736999298e1
                                                                • Instruction Fuzzy Hash: 90216A789203458FDB10EFA9D4097DABBF8EB49324F148429E545A7601DB389544CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2155 6416850-6417fec GlobalMemoryStatusEx 2158 6417ff5-641801d 2155->2158 2159 6417fee-6417ff4 2155->2159 2159->2158
                                                                APIs
                                                                • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,06417EF2), ref: 06417FDF
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508203066.0000000006410000.00000040.00000800.00020000.00000000.sdmp, Offset: 06410000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6410000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: GlobalMemoryStatus
                                                                • String ID:
                                                                • API String ID: 1890195054-0
                                                                • Opcode ID: 356bbfe7d3a3ea144140cfb7aac6fad27981143e3a767d20409cfe2642ed94f3
                                                                • Instruction ID: 1ff0144de996d9b1aa0096a2937884c85c09bdb0dc882acd80af72d9130b2bc9
                                                                • Opcode Fuzzy Hash: 356bbfe7d3a3ea144140cfb7aac6fad27981143e3a767d20409cfe2642ed94f3
                                                                • Instruction Fuzzy Hash: 1F1114B1C046599BCB10DFAAC444BEEFBF4AF48224F15816AE918B7340D778A945CFE1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2162 1274ce8-1274d2a 2165 1274d30 2162->2165 2166 1274d2c-1274d2e 2162->2166 2167 1274d35-1274d40 2165->2167 2166->2167 2168 1274d42-1274d73 RtlEncodePointer 2167->2168 2169 1274da1-1274dae 2167->2169 2171 1274d75-1274d7b 2168->2171 2172 1274d7c-1274d9c 2168->2172 2171->2172 2172->2169
                                                                APIs
                                                                • RtlEncodePointer.NTDLL(00000000), ref: 01274D62
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.506422396.0000000001270000.00000040.00000800.00020000.00000000.sdmp, Offset: 01270000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_1270000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID: EncodePointer
                                                                • String ID:
                                                                • API String ID: 2118026453-0
                                                                • Opcode ID: 662d0329970e426b902419531b8683416d74ae9bf7663a359990f91bf38b5f03
                                                                • Instruction ID: 61f8dd18acad0f9a15459590f2c3588f88e0e72ffed72a0695802cece09826ca
                                                                • Opcode Fuzzy Hash: 662d0329970e426b902419531b8683416d74ae9bf7663a359990f91bf38b5f03
                                                                • Instruction Fuzzy Hash: 4B119A749103458FCB20EFA9C4087DEBFF8EB49314F14842AE545B7600CB38A544CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3296 6295b08-6295b7b 3305 6295b82-6295bb0 3296->3305 3310 6295c28-6295c4c 3305->3310 3311 6295bb2-6295bbc 3305->3311 3319 6295c4e 3310->3319 3320 6295c57 3310->3320 3314 6295bbe-6295bc4 3311->3314 3315 6295bd4-6295c26 3311->3315 3317 6295bc8-6295bca 3314->3317 3318 6295bc6 3314->3318 3315->3310 3315->3311 3317->3315 3318->3315 3319->3320 3322 6295c58 3320->3322 3322->3322
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: P@kk
                                                                • API String ID: 0-3334100930
                                                                • Opcode ID: 2870b4428352b98cb756d070f6bc246f76d87d90ac663da682bce4c2ed90c675
                                                                • Instruction ID: 09f7740891a11c0930c3026daf951014df793286e490c4cff7149791cb6241aa
                                                                • Opcode Fuzzy Hash: 2870b4428352b98cb756d070f6bc246f76d87d90ac663da682bce4c2ed90c675
                                                                • Instruction Fuzzy Hash: 4031F270F002008FCB55AF74D4696AE77B3EF89244B158928E806EB395EF34CC01CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3329 6295b18-6295b7b 3337 6295b82-6295bb0 3329->3337 3342 6295c28-6295c4c 3337->3342 3343 6295bb2-6295bbc 3337->3343 3351 6295c4e 3342->3351 3352 6295c57 3342->3352 3346 6295bbe-6295bc4 3343->3346 3347 6295bd4-6295c26 3343->3347 3349 6295bc8-6295bca 3346->3349 3350 6295bc6 3346->3350 3347->3342 3347->3343 3349->3347 3350->3347 3351->3352 3354 6295c58 3352->3354 3354->3354
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: P@kk
                                                                • API String ID: 0-3334100930
                                                                • Opcode ID: d820ae1d22eda0b9fe09c45dd74ce8b9e6cfbc92b0de25661d95aa45f14b2a50
                                                                • Instruction ID: dc23a2cfc189aa8ec3333df79fae2580498e7b3ab07bcfbbbedf230b6bad5f15
                                                                • Opcode Fuzzy Hash: d820ae1d22eda0b9fe09c45dd74ce8b9e6cfbc92b0de25661d95aa45f14b2a50
                                                                • Instruction Fuzzy Hash: 7131AF71F002148FCB55AF74D4686AEB7B2EF89244B118528E80AEB395EF34DC45CBA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8deaa3ff9fc8747838eabf6e8459e07a263d36e8ae757509ac52b8482043b648
                                                                • Instruction ID: 4e8affbe8f3b3d23e5598b68eb44ab28960d1dcd337625038888d46b996897ab
                                                                • Opcode Fuzzy Hash: 8deaa3ff9fc8747838eabf6e8459e07a263d36e8ae757509ac52b8482043b648
                                                                • Instruction Fuzzy Hash: 04D15B35F202158FDF55DFB8D8546AEBBB2AB89314F144829E805E7350EB34DC46CBA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bf33a76886cfda032221bde36269308e0a2baf8753d9e393b1849ca5d5506a35
                                                                • Instruction ID: e4823ea7026f467aa1dd487e471a344324151c6de73c1405fcc7d0450682b235
                                                                • Opcode Fuzzy Hash: bf33a76886cfda032221bde36269308e0a2baf8753d9e393b1849ca5d5506a35
                                                                • Instruction Fuzzy Hash: A0E16734A10201CFDB64EF68D058A5DBBF2FF84359F15896AE81A9B350DB359845CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 291367d7ce6013ee9c150570e9e46883e1bf8d0ba38f7c7a481fb16ab04fc60b
                                                                • Instruction ID: 58bfe3f3e24dbd7a192c4432998696e709b78b17bd18579c15ea407b60848396
                                                                • Opcode Fuzzy Hash: 291367d7ce6013ee9c150570e9e46883e1bf8d0ba38f7c7a481fb16ab04fc60b
                                                                • Instruction Fuzzy Hash: D1A19E30E1424ADFCF15CFA4C844ADEBFB2BF89310F05816AE845AB361DB70A855CB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a2c510147800685f9b55bd9864c1d7fd71a2b8a70c4913fb6bacaeddbf005e25
                                                                • Instruction ID: a76b6547ee2d3ddab49db9c3e7aa119f4e41850f5c5f5ac58fc5a8842b3d63be
                                                                • Opcode Fuzzy Hash: a2c510147800685f9b55bd9864c1d7fd71a2b8a70c4913fb6bacaeddbf005e25
                                                                • Instruction Fuzzy Hash: BD819230F006018FDB54DBB4D5647AE76E2AFC8344F148929E80ADB794EF34DC068BA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 52c48a7f76399a1f5e8c426edf5646d21cef0d7ee1561059af2c2954717913e9
                                                                • Instruction ID: eae96a6d99ef43766d2184f7df8a5dfa4ed1336910dc79daad67692194e69242
                                                                • Opcode Fuzzy Hash: 52c48a7f76399a1f5e8c426edf5646d21cef0d7ee1561059af2c2954717913e9
                                                                • Instruction Fuzzy Hash: D081E730B193818FDB52D77489186A77FF6DF86304F1584A6D488CB797E6388C1AC761
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8c3582a16b364359eede71074ba64c6e23c4a91155ff09aa111a98186b86992e
                                                                • Instruction ID: c3be4be77a9f6ac6b7534f97120bec8ac230f8da09b568e4c9bc9593b0ec017f
                                                                • Opcode Fuzzy Hash: 8c3582a16b364359eede71074ba64c6e23c4a91155ff09aa111a98186b86992e
                                                                • Instruction Fuzzy Hash: 3E71F230B257418FD7429768DD257AB7BF6EF85704F0980B2E908DB792EA34DC068761
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 024584d33d65ad1284b3d5e5b643f3deb9377513916487fdc9efd551176c15db
                                                                • Instruction ID: 27a4d58c813175682fc35572f59618d6fd91ef764bd1ddefbbecee47327cf333
                                                                • Opcode Fuzzy Hash: 024584d33d65ad1284b3d5e5b643f3deb9377513916487fdc9efd551176c15db
                                                                • Instruction Fuzzy Hash: 3B716230F102158BDF54ABB4D5647AE76E2AFC8344F158929E80ADB794EF34DC068BA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e28b64fd6d25e1c95c0f7e3a6ba791e49e10e9ea213a6db2c59b52013ad63a72
                                                                • Instruction ID: 6e69d49a9fd788af723ac94cc8c8daa254055cce42cef405fccb237b13c8d64b
                                                                • Opcode Fuzzy Hash: e28b64fd6d25e1c95c0f7e3a6ba791e49e10e9ea213a6db2c59b52013ad63a72
                                                                • Instruction Fuzzy Hash: E071B230E102018BEF648B68C54879DBBE2EFC9314F25C56AE8199F399DB72D845C7B1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6ff878d5a9175e08c01706f0318f83b6a6d427f97e4401684c169c8ce89e9ffd
                                                                • Instruction ID: ea2b3f42de2921622af87cddd04268f284e90ca1fc8838c36a669a81fc9c4c42
                                                                • Opcode Fuzzy Hash: 6ff878d5a9175e08c01706f0318f83b6a6d427f97e4401684c169c8ce89e9ffd
                                                                • Instruction Fuzzy Hash: C1716C34B246068FDF54DF38C494A6A7BE5AF89600B1548AAE805CB371DB70DC51DBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 41446f41f88009201bca815a9fe19df05942f83429332984809d63fa9751dcf8
                                                                • Instruction ID: 62b13a4643df82f1a999460f90a562945fb21ff44491545c3010466dad66816e
                                                                • Opcode Fuzzy Hash: 41446f41f88009201bca815a9fe19df05942f83429332984809d63fa9751dcf8
                                                                • Instruction Fuzzy Hash: 85510231F105158FDB60DB78D84476AB6A2AF89318F128179ED99DB7A1DB30DC0287E1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: dbe7a4055400c2630f415199e65c0afafd2ded21b59a9e79aad4e698feeb322a
                                                                • Instruction ID: 5c2341c8f661bafdfadcdc41cb1593dcef63696048c3c5af7b5ae85399554a8a
                                                                • Opcode Fuzzy Hash: dbe7a4055400c2630f415199e65c0afafd2ded21b59a9e79aad4e698feeb322a
                                                                • Instruction Fuzzy Hash: DB510A30B182814FEF519334C96535A7BE2DFD6308F69C4A6D448CF7C6D636D8568362
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 33e657b51a9796b6b8d48e999e6cb6059fdb0c7046ffdbef19b4187dcdd38ba4
                                                                • Instruction ID: d0998378cacb80fc147a9281c9550aeb474d73837bcc214aae6d93970fac57c5
                                                                • Opcode Fuzzy Hash: 33e657b51a9796b6b8d48e999e6cb6059fdb0c7046ffdbef19b4187dcdd38ba4
                                                                • Instruction Fuzzy Hash: 0E415E35B112118FDF94ABB8D56977E76A2AFC8204F148429E806DB794EF748C06CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b22bb4191eee26df79e76614d73c7aa3e4745dce446334b614df1b2018d8da3f
                                                                • Instruction ID: 9b7ba68be393815d29c7db6e3f04d6bd973f5d96e10ad268db57821a2047fbae
                                                                • Opcode Fuzzy Hash: b22bb4191eee26df79e76614d73c7aa3e4745dce446334b614df1b2018d8da3f
                                                                • Instruction Fuzzy Hash: 3141C330A2424ADFDF51CFA4C844A9EBFB2EF85310F058156EC95AB2A1D771ED10CBA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 99df0710c930349477a5a5a321e6bb94f3c3775d25d8494344ebb037353cb634
                                                                • Instruction ID: da01dc3d2b7545e0fc5f68a254c13d99091bb306495c98e8a4e54a4ce97d8494
                                                                • Opcode Fuzzy Hash: 99df0710c930349477a5a5a321e6bb94f3c3775d25d8494344ebb037353cb634
                                                                • Instruction Fuzzy Hash: 7751F238D102189FCB40EFA4E5949DDBBB1FB88308B125A25D818EBB58EB346945CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7e683ca45f32aedcc7aef006923e5dba26b9a55fa341ab22815b024ad8438420
                                                                • Instruction ID: bef9182ee861623eafe22309a07f11b2898479c54b5098d5cd5ad42598335066
                                                                • Opcode Fuzzy Hash: 7e683ca45f32aedcc7aef006923e5dba26b9a55fa341ab22815b024ad8438420
                                                                • Instruction Fuzzy Hash: C1218530E112099FCB81DFA9D58469EBBF6EBC9314F148565D508E7342E734D845CBA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 917a78388c9b933702cce9319d1625f323f5135f16df4563246cad7d23876aa2
                                                                • Instruction ID: c7618ad527811495e86a9a7e09bbb095399ef038eb3c719a14ce30f648f29d74
                                                                • Opcode Fuzzy Hash: 917a78388c9b933702cce9319d1625f323f5135f16df4563246cad7d23876aa2
                                                                • Instruction Fuzzy Hash: 0021F931A14246EFDF10CF68C84579EBBA2AFC5310F068556D8949B2A2D371E810C7B5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2d3a8d926aff121b909123108dd126b9961d7956738e10f37253057910df5908
                                                                • Instruction ID: ba77de79946a7edf43c909cec20dd20ed8a825667a0b7b3dd3941171dc6e1d0c
                                                                • Opcode Fuzzy Hash: 2d3a8d926aff121b909123108dd126b9961d7956738e10f37253057910df5908
                                                                • Instruction Fuzzy Hash: 7611BF32D052589FCF05CFA8D8549DEBFB5EF89320F05406AE846EB254DB30A915CBA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 06c9102772d29ea521da46d576f98a5d210c700144a683973fea7d1b0566964a
                                                                • Instruction ID: 73a2d91e8521e654f1e2dc1a6fc2a5cf01d89d8e32f01a73ce87f77356902379
                                                                • Opcode Fuzzy Hash: 06c9102772d29ea521da46d576f98a5d210c700144a683973fea7d1b0566964a
                                                                • Instruction Fuzzy Hash: 2811A331F209168FDB54DE19E04876DB761EFC8660F448925DD09CB251DB70E851D7B1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c09854c835ef05114292d13ed847b34c098b5542e6030c2c130bd17184456f0f
                                                                • Instruction ID: e9f3d3ea92eab862a0ab38c16063289af8577accf3abfa68a08d2c22083cddfd
                                                                • Opcode Fuzzy Hash: c09854c835ef05114292d13ed847b34c098b5542e6030c2c130bd17184456f0f
                                                                • Instruction Fuzzy Hash: A3115275F101148F8FC0EBB9C85499EB7F6FBCD6547508429D909E7754EB349D018BA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2551082fe9b9bc09c8fe2c55c201dac9cc10d6f734e7c8bf9ad410e42527f6e8
                                                                • Instruction ID: eb5a8e6c1dd74dc792d66ed021997bbabde4f6729a43536257f05aa4a53096a6
                                                                • Opcode Fuzzy Hash: 2551082fe9b9bc09c8fe2c55c201dac9cc10d6f734e7c8bf9ad410e42527f6e8
                                                                • Instruction Fuzzy Hash: 8A115135B101159F8B80EFADD98559EBBF1FB8C6147108425E509D3744EB309D418FA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3eb46633bdf0a777da41b6ff55a05af6b37615f97ff05da98dd42b1744609179
                                                                • Instruction ID: 610268ca393e3406a374944c13f4d301e8ff731a987642569c54c75e67bce5ce
                                                                • Opcode Fuzzy Hash: 3eb46633bdf0a777da41b6ff55a05af6b37615f97ff05da98dd42b1744609179
                                                                • Instruction Fuzzy Hash: 0CE065B6E101159F8780EBFC98452EE7FF59A8C1217044426E509E3304F6704A118BD1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d4e4e47934387e343968a6cf8c010b12870f8b91d7d21142dd21991bbb510111
                                                                • Instruction ID: 3ea90aca747c311c33f0b3922dfe43b68afac579b7beb3c7ec561c060e6617fd
                                                                • Opcode Fuzzy Hash: d4e4e47934387e343968a6cf8c010b12870f8b91d7d21142dd21991bbb510111
                                                                • Instruction Fuzzy Hash: A7E0ED35B201158B8F80FBB8D8648ED73F2BBC9255B118065E90AE7754EE349C058BB1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1576f2b9358ab99eb3203614be6dda54198cc1851fcba89ca69202b40a1965b2
                                                                • Instruction ID: 820ed04be92c3b206a0c965d148320315406a0d8de4a9752e9f031314a470108
                                                                • Opcode Fuzzy Hash: 1576f2b9358ab99eb3203614be6dda54198cc1851fcba89ca69202b40a1965b2
                                                                • Instruction Fuzzy Hash: 98E03939B200158F8F40EBACD8988ADB7F1EB8C215B118065E90AE3794EE349C418B61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000008.00000002.508092226.0000000006290000.00000040.00000800.00020000.00000000.sdmp, Offset: 06290000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_8_2_6290000_Outstanding Balance.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 604d6c51d850c119393d0d692a10370c3021b343b7ad0e5677363e1146c2ed34
                                                                • Instruction ID: bad23bab56657c5259012b3e3894519da205dfebb8045fbeccc7d55cc7b60a84
                                                                • Opcode Fuzzy Hash: 604d6c51d850c119393d0d692a10370c3021b343b7ad0e5677363e1146c2ed34
                                                                • Instruction Fuzzy Hash: BAE01276E102159F4B40EBAD98055EF7BF8EA8C661B014476E54DD3300EA704A518BE1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%