Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PAYMENT-ADVICE.exe

Overview

General Information

Sample Name:PAYMENT-ADVICE.exe
Analysis ID:680371
MD5:2d9f2c92d70a25ad42fe3602d7f932b1
SHA1:ca8fb29bd419998b7f2da87c49f1eb7b2c0700a0
SHA256:001709cadc8a0a856d91b9e3c9c0753ac8469d3c6cf2f532fdd53aedb3a268d6
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Modifies the hosts file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Adds a directory exclusion to Windows Defender
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • PAYMENT-ADVICE.exe (PID: 5664 cmdline: "C:\Users\user\Desktop\PAYMENT-ADVICE.exe" MD5: 2D9F2C92D70A25AD42FE3602D7F932B1)
    • BackgroundTransferHost.exe (PID: 1504 cmdline: "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1 MD5: 02BA81746B929ECC9DB6665589B68335)
    • powershell.exe (PID: 2404 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rNFzixmDCD.exe MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 5744 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • schtasks.exe (PID: 5416 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rNFzixmDCD" /XML "C:\Users\user\AppData\Local\Temp\tmpA427.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • PAYMENT-ADVICE.exe (PID: 3156 cmdline: C:\Users\user\Desktop\PAYMENT-ADVICE.exe MD5: 2D9F2C92D70A25AD42FE3602D7F932B1)
    • PAYMENT-ADVICE.exe (PID: 1504 cmdline: C:\Users\user\Desktop\PAYMENT-ADVICE.exe MD5: 2D9F2C92D70A25AD42FE3602D7F932B1)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "vikas@waytogochile.com", "Password": "Vikas2020", "Host": "mail.waytogochile.com"}
SourceRuleDescriptionAuthorStrings
PAYMENT-ADVICE.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\rNFzixmDCD.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      SourceRuleDescriptionAuthorStrings
      00000009.00000000.280352342.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000009.00000000.280352342.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000009.00000000.280352342.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
          • 0x301b2:$a13: get_DnsResolver
          • 0x2e993:$a20: get_LastAccessed
          • 0x30b30:$a27: set_InternalServerPort
          • 0x30e4f:$a30: set_GuidMasterKey
          • 0x2ea9a:$a33: get_Clipboard
          • 0x2eaa8:$a34: get_Keyboard
          • 0x2fdcd:$a35: get_ShiftKeyDown
          • 0x2fdde:$a36: get_AltKeyDown
          • 0x2eab5:$a37: get_Password
          • 0x2f57d:$a38: get_PasswordHash
          • 0x305b2:$a39: get_DefaultCredentials
          00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              Click to see the 11 entries
              SourceRuleDescriptionAuthorStrings
              0.2.PAYMENT-ADVICE.exe.36d09d0.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.PAYMENT-ADVICE.exe.36d09d0.5.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                  0.2.PAYMENT-ADVICE.exe.36d09d0.5.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x30e7b:$s10: logins
                  • 0x308e2:$s11: credential
                  • 0x2ce9a:$g1: get_Clipboard
                  • 0x2cea8:$g2: get_Keyboard
                  • 0x2ceb5:$g3: get_Password
                  • 0x2e1bd:$g4: get_CtrlKeyDown
                  • 0x2e1cd:$g5: get_ShiftKeyDown
                  • 0x2e1de:$g6: get_AltKeyDown
                  0.2.PAYMENT-ADVICE.exe.36d09d0.5.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
                  • 0x2e5b2:$a13: get_DnsResolver
                  • 0x2cd93:$a20: get_LastAccessed
                  • 0x2ef30:$a27: set_InternalServerPort
                  • 0x2f24f:$a30: set_GuidMasterKey
                  • 0x2ce9a:$a33: get_Clipboard
                  • 0x2cea8:$a34: get_Keyboard
                  • 0x2e1cd:$a35: get_ShiftKeyDown
                  • 0x2e1de:$a36: get_AltKeyDown
                  • 0x2ceb5:$a37: get_Password
                  • 0x2d97d:$a38: get_PasswordHash
                  • 0x2e9b2:$a39: get_DefaultCredentials
                  9.0.PAYMENT-ADVICE.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 23 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: PAYMENT-ADVICE.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\rNFzixmDCD.exeJoe Sandbox ML: detected
                    Source: 9.0.PAYMENT-ADVICE.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "vikas@waytogochile.com", "Password": "Vikas2020", "Host": "mail.waytogochile.com"}
                    Source: PAYMENT-ADVICE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: PAYMENT-ADVICE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Networking

                    barindex
                    Source: Yara matchFile source: PAYMENT-ADVICE.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.PAYMENT-ADVICE.exe.e0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: C:\Users\user\AppData\Roaming\rNFzixmDCD.exe, type: DROPPED
                    Source: Joe Sandbox ViewIP Address: 50.87.144.250 50.87.144.250
                    Source: global trafficTCP traffic: 192.168.2.3:49742 -> 50.87.144.250:587
                    Source: global trafficTCP traffic: 192.168.2.3:49742 -> 50.87.144.250:587
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317075496.0000000006CFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/cps.html0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317075496.0000000006CFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/last.crl0G
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317999412.0000000006A52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acedicom.edicomgroup.com/doc0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317550868.0000000006CD3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317550868.0000000006CD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                    Source: PAYMENT-ADVICE.exe, rNFzixmDCD.exe.0.drString found in binary or memory: http://boards.4chan.org/b/
                    Source: PAYMENT-ADVICE.exe, rNFzixmDCD.exe.0.drString found in binary or memory: http://boards.4chan.org3Retrieving
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cSdGYD.com
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.445945425.0000000006CDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0g
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/ocsp0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/1604
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crt0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crl
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crt08
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317075496.0000000006CFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.siths.se/sithsrootcav1.html0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317075496.0000000006CFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317885982.0000000006C3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.defence.gov.au/pki0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.445543359.0000000006A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.microsfCC
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.oces.trust2408.com/oces.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317999412.0000000006A52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.pki.wellsfargo.com/wsprca.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-a/cacrl.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-b/cacrl.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-c/cacrl.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.516179163.0000000006C4F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317914965.0000000006C4F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/CABD2A79A1076A31F21D253635CB0
                    Source: 77EC63BDA74BD0D0E0426DC8F80085060.9.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.315690864.0000000006A1D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?c1c2e6a323c16
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/CRL2/CA.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.240967922.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.wi
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317999412.0000000006A52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317999412.0000000006A52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.516179163.0000000006C4F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317914965.0000000006C4F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
                    Source: PAYMENT-ADVICE.exe, rNFzixmDCD.exe.0.drString found in binary or memory: http://images.4chan.org/
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.waytogochile.com
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.445543359.0000000006A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://microsoft.co
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.eca.hinet.net/OCSP/ocspG2sha20
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.ncdc.gov.sa0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.gva.es0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.suscerte.gob.ve0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317999412.0000000006A52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.digidentity.eu/validatie0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.registradores.org/normativa/index.htm0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://postsignum.ttc.cz/crl/psrootqca2.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.446747240.0000000006C37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://waytogochile.com
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcaparta1.crl
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317885982.0000000006C3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org/doc0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/acrn.crl0)
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ancert.com/cps0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/AC/RC/ocsp0c
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/es/address-direccion.html
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242811712.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242850054.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242811712.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242703690.0000000005372000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242850054.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242718773.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html6
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.446747240.0000000006C37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ca.posta.rs/dokumentacija0h
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242187057.0000000005367000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241919573.0000000005364000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242690202.000000000536B000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241434338.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242509856.0000000005365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.241239656.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241179726.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241220651.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241332459.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241287867.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241495178.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241311661.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241434338.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241268186.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241479619.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241200143.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241464737.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comB
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.241434338.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comE
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242187057.0000000005367000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241919573.0000000005364000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242690202.000000000536B000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242509856.0000000005365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comno
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242187057.0000000005367000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241919573.0000000005364000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242690202.000000000536B000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242509856.0000000005365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comtio
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.241434338.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comw
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317999412.0000000006A52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certicamara.com/dpc/0Z
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class1.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317550868.0000000006CD3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317885982.0000000006C3A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317999412.0000000006A52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3TS.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317075496.0000000006CFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.correo.com.uy/correocert/cps.pdf0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317237841.0000000006CF7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-bt0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-int0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317936131.0000000006CAF000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317655861.0000000006CAE000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000002.516201934.0000000006CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-std0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.defence.gov.au/pki0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.445945425.0000000006CDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.445945425.0000000006CDB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca0f
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.dnie.es/dpc0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-me.lv/repository0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317533820.0000000006CD1000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000002.516217676.0000000006CD1000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317075496.0000000006CFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ecee.gov.pt/dpc0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.echoworx.com/ca/root2/cps.pdf0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.eme.lv/repository0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.250249996.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.282918228.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.250178006.0000000005392000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245966630.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000002.291999684.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249191383.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249400543.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249285616.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249085609.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245990326.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.243968794.0000000005394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/V
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.244266150.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.243927606.000000000538F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245227416.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245043521.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244602175.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244869097.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244529636.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244785379.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244574340.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245196092.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244957508.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245070927.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244641952.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244727855.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244553519.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244841565.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244927047.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245173045.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244990804.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244810442.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244761242.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244620054.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html5
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245503899.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245464381.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245173045.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersY
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245196092.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245173045.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersersu
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.244015012.000000000538F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.243987838.000000000538F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.244015012.000000000538F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244042187.000000000538F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244106324.000000000538F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244074813.000000000538F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designerst
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245070927.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersu
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.244602175.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244785379.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244574340.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244641952.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244553519.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244810442.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244620054.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com=
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.243968794.0000000005394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comC.TTF
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.243996542.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244024643.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244042187.000000000538F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comD
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244810442.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244620054.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245227416.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245196092.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245443702.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245966630.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245402109.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245256302.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245503899.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245173045.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245464381.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245990326.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comFV
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245503899.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245464381.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comY
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.244024643.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244042187.000000000538F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.250249996.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244356405.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244393260.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244308922.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244451182.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249004082.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244338184.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249191383.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249400543.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244288016.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249285616.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244471028.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249085609.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244502148.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma2
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245227416.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245196092.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245443702.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245070927.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245402109.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245256302.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245503899.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245173045.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245464381.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.250249996.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.282918228.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249191383.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249400543.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249285616.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249085609.0000000005394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comasvj
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245227416.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245196092.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245443702.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245966630.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245402109.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245256302.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245503899.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245173045.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245464381.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245990326.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomD
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.244602175.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244869097.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244529636.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244785379.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244574340.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244957508.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244641952.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244553519.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244841565.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244927047.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244810442.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244620054.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcoma2
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245227416.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244356405.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244393260.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245043521.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244602175.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244308922.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244237769.000000000538F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244529636.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244574340.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245196092.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245443702.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244957508.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244451182.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245070927.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244338184.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245402109.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245256302.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244553519.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244288016.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245173045.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244990804.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.244356405.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244308922.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244237769.000000000538F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244338184.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244288016.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244266150.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessed
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245503899.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245464381.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comessedc
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.250249996.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.282918228.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249004082.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249191383.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249400543.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249285616.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249085609.0000000005394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgritaY
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245966630.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245990326.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comituoj
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.244266150.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commO
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.243996542.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244024643.0000000005394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comsiv
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.240620543.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.c
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.240620543.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.240620543.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn8
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.240620543.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnw
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.246650218.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246706890.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.246830825.0000000005398000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246978724.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246940070.0000000005399000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246650218.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246957843.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246858763.0000000005399000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.247029558.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246911108.0000000005398000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246767410.0000000005398000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246886066.0000000005398000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246692555.0000000005398000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.246677015.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246650218.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmf
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.515403329.00000000069CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.515403329.00000000069CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0=
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242651071.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242056881.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242132857.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242573887.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242298115.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242621313.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242405955.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242821504.0000000005395000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242223653.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242596197.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242718773.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242445517.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242651071.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/D
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242056881.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242132857.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241998865.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242573887.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242298115.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242621313.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242405955.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242821504.0000000005395000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242223653.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242596197.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242718773.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242445517.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242651071.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/V
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242056881.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242132857.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241998865.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242223653.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241951986.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242298115.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242405955.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y0/
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242298115.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242621313.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242405955.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242821504.0000000005395000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242596197.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242718773.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242651071.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/j
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242445517.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242651071.000000000538E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242573887.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242298115.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242621313.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242405955.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242596197.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242445517.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/Y
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242573887.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242445517.0000000005390000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/j
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.242056881.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241998865.0000000005394000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/ru-r
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.oaticerts.com/repository.
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_21_1.pdf0:
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0%
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.postsignum.cz/crl/psrootqca2.crl02
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.rcsc.lt/repository0
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/cps/0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/juur/crl/0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ssc.lt/cps03
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/dpc0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/lcr0#
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustdst.com/certificates/policy/ACES-index.html0
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/acrn/acrn.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.241093875.000000000538F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.241093875.000000000538F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cnTC
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.241093875.000000000538F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www2.postsignum.cz/crl/psrootqca2.crl01
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://yLQhmTW8SSM1qrmdWGs5.org
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://yLQhmTW8SSM1qrmdWGs5.orgT
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crl.anf.es/AC/ANFServerCA.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://eca.hinet.net/repository0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://web.certicamara.com/marco-legal0Z
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ACTAS/789230
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ANFServerCA.crl0
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.317885982.0000000006C3A000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/address/)1(0&
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.hu/docs/
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.516201934.0000000006CAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.net/docs
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m
                    Source: unknownDNS traffic detected: queries for: mail.waytogochile.com
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.283736484.000000000084A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                    System Summary

                    barindex
                    Source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                    Source: 9.0.PAYMENT-ADVICE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 9.0.PAYMENT-ADVICE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                    Source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                    Source: 0.2.PAYMENT-ADVICE.exe.3665b90.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.PAYMENT-ADVICE.exe.3665b90.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.PAYMENT-ADVICE.exe.3665b90.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                    Source: 00000009.00000000.280352342.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                    Source: 00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                    Source: Process Memory Space: PAYMENT-ADVICE.exe PID: 5664, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                    Source: Process Memory Space: PAYMENT-ADVICE.exe PID: 1504, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                    Source: initial sampleStatic PE information: Filename: PAYMENT-ADVICE.exe
                    Source: 9.0.PAYMENT-ADVICE.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b4E1E76AAu002dE2D0u002d4D19u002dBD9Au002dCF96A84B78A4u007d/u0031B8FAABEu002d34E3u002d4350u002d890Fu002d0E99A35F60D9.csLarge array initialization: .cctor: array initializer size 11665
                    Source: PAYMENT-ADVICE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                    Source: 9.0.PAYMENT-ADVICE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 9.0.PAYMENT-ADVICE.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                    Source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                    Source: 0.2.PAYMENT-ADVICE.exe.3665b90.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.PAYMENT-ADVICE.exe.3665b90.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.PAYMENT-ADVICE.exe.3665b90.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                    Source: 00000009.00000000.280352342.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                    Source: 00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                    Source: Process Memory Space: PAYMENT-ADVICE.exe PID: 5664, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                    Source: Process Memory Space: PAYMENT-ADVICE.exe PID: 1504, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 0_2_04923DC4
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 0_2_04928458
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 0_2_0719003D
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 0_2_07190040
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 0_2_07193A8A
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 0_2_08EA9B28
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 0_2_08EA0040
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0139F378
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0139F6C0
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_05302120
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_05300040
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0530C851
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0530BB10
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_05303628
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0530A9E1
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0530AACD
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_06573E98
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_06571D50
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_065727D8
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_065727E8
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_06574DE8
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_065857D8
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0658B440
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0658817C
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_06583F70
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_06586C78
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_06582DF0
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0658B878
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_06580040
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_06580006
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.283736484.000000000084A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exe, 00000000.00000000.235185108.00000000001D5000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNullStreamRea.exe: vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesmtJMOeygYIrhXlZSNZapre.exe4 vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exe, 00000000.00000003.253965460.0000000006B45000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.295134788.0000000006CD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.295980075.0000000006F50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.294947142.0000000006CB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesmtJMOeygYIrhXlZSNZapre.exe4 vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.500877789.0000000000CF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exe, 00000009.00000000.281187075.0000000000436000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesmtJMOeygYIrhXlZSNZapre.exe4 vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exeBinary or memory string: OriginalFilenameNullStreamRea.exe: vs PAYMENT-ADVICE.exe
                    Source: PAYMENT-ADVICE.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: rNFzixmDCD.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: PAYMENT-ADVICE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: rNFzixmDCD.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile read: C:\Users\user\Desktop\PAYMENT-ADVICE.exeJump to behavior
                    Source: PAYMENT-ADVICE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\PAYMENT-ADVICE.exe "C:\Users\user\Desktop\PAYMENT-ADVICE.exe"
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\System32\BackgroundTransferHost.exe "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rNFzixmDCD.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rNFzixmDCD" /XML "C:\Users\user\AppData\Local\Temp\tmpA427.tmp
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Users\user\Desktop\PAYMENT-ADVICE.exe C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Users\user\Desktop\PAYMENT-ADVICE.exe C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rNFzixmDCD.exe
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rNFzixmDCD" /XML "C:\Users\user\AppData\Local\Temp\tmpA427.tmp
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Users\user\Desktop\PAYMENT-ADVICE.exe C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\System32\BackgroundTransferHost.exe "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
                    Source: C:\Windows\System32\BackgroundTransferHost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\System32\BackgroundTransferHost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile created: C:\Users\user\AppData\Roaming\rNFzixmDCD.exeJump to behavior
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA427.tmpJump to behavior
                    Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@12/11@2/1
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: PAYMENT-ADVICE.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5744:120:WilError_01
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeMutant created: \Sessions\1\BaseNamedObjects\BzrZYiZihqWuwBBuzQTbco
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4480:120:WilError_01
                    Source: PAYMENT-ADVICE.exe, Scraper/Archiving/Zip/Compression/Streams/DeflaterOutputStream.csCryptographic APIs: 'TransformBlock'
                    Source: PAYMENT-ADVICE.exe, Scraper/frmMain.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: PAYMENT-ADVICE.exe, Scraper/Archiving/Zip/Compression/Streams/InflaterInputBuffer.csCryptographic APIs: 'TransformBlock'
                    Source: PAYMENT-ADVICE.exe, Scraper/Archiving/Zip/Compression/Streams/InflaterInputBuffer.csCryptographic APIs: 'TransformBlock'
                    Source: rNFzixmDCD.exe.0.dr, Scraper/frmMain.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: rNFzixmDCD.exe.0.dr, Scraper/Archiving/Zip/Compression/Streams/InflaterInputBuffer.csCryptographic APIs: 'TransformBlock'
                    Source: rNFzixmDCD.exe.0.dr, Scraper/Archiving/Zip/Compression/Streams/InflaterInputBuffer.csCryptographic APIs: 'TransformBlock'
                    Source: rNFzixmDCD.exe.0.dr, Scraper/Archiving/Zip/Compression/Streams/DeflaterOutputStream.csCryptographic APIs: 'TransformBlock'
                    Source: 0.0.PAYMENT-ADVICE.exe.e0000.0.unpack, Scraper/Archiving/Zip/Compression/Streams/DeflaterOutputStream.csCryptographic APIs: 'TransformBlock'
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: PAYMENT-ADVICE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: PAYMENT-ADVICE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 0_2_04926D2F push F800005Eh; retf
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 0_2_08EA70F9 push E006CEABh; ret
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_013945A1 pushad ; retf 0002h
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_01394CD8 push esp; retf 0002h
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0530EF3A pushad ; ret
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0658D176 push es; iretd
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0658DC73 push esi; ret
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_0658DDAA push ebp; ret
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.612937074384405
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.612937074384405
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile created: C:\Users\user\AppData\Roaming\rNFzixmDCD.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rNFzixmDCD" /XML "C:\Users\user\AppData\Local\Temp\tmpA427.tmp
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 00000000.00000002.287162918.00000000027CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PAYMENT-ADVICE.exe PID: 5664, type: MEMORYSTR
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.287162918.00000000027CE000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.287162918.00000000027CE000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                    Source: C:\Windows\System32\BackgroundTransferHost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\System32\BackgroundTransferHost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exe TID: 5676Thread sleep time: -45877s >= -30000s
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exe TID: 4764Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5308Thread sleep time: -3689348814741908s >= -30000s
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exe TID: 5792Thread sleep time: -1844674407370954s >= -30000s
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exe TID: 5908Thread sleep count: 9572 > 30
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9393
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeWindow / User API: threadDelayed 9572
                    Source: C:\Windows\System32\BackgroundTransferHost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\System32\BackgroundTransferHost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeThread delayed: delay time: 45877
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeThread delayed: delay time: 922337203685477
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: PAYMENT-ADVICE.exe, 00000009.00000002.515737279.0000000006AA1000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.315128498.0000000006AB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: PAYMENT-ADVICE.exe, 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess token adjusted: Debug
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_06581E10 LdrInitializeThunk,
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeMemory written: C:\Users\user\Desktop\PAYMENT-ADVICE.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rNFzixmDCD.exe
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rNFzixmDCD.exe
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rNFzixmDCD.exe
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rNFzixmDCD" /XML "C:\Users\user\AppData\Local\Temp\tmpA427.tmp
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Users\user\Desktop\PAYMENT-ADVICE.exe C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeProcess created: C:\Windows\System32\BackgroundTransferHost.exe "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Users\user\Desktop\PAYMENT-ADVICE.exe VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-ds-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-base-Package~31bf3856ad364e35~amd64~en-US~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Windows-Defender-Management-Powershell-Group-WOW64-Package~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Users\user\Desktop\PAYMENT-ADVICE.exe VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeCode function: 9_2_05305008 GetUserNameW,

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.PAYMENT-ADVICE.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PAYMENT-ADVICE.exe.3665b90.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000000.280352342.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PAYMENT-ADVICE.exe PID: 5664, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PAYMENT-ADVICE.exe PID: 1504, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\Desktop\PAYMENT-ADVICE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: Yara matchFile source: 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PAYMENT-ADVICE.exe PID: 1504, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 9.0.PAYMENT-ADVICE.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PAYMENT-ADVICE.exe.36d09d0.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PAYMENT-ADVICE.exe.369c1b0.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.PAYMENT-ADVICE.exe.3665b90.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000000.280352342.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: PAYMENT-ADVICE.exe PID: 5664, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: PAYMENT-ADVICE.exe PID: 1504, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    File and Directory Permissions Modification
                    2
                    OS Credential Dumping
                    1
                    Account Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Scheduled Task/Job
                    Boot or Logon Initialization Scripts1
                    Scheduled Task/Job
                    11
                    Disable or Modify Tools
                    1
                    Input Capture
                    1
                    File and Directory Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    Exfiltration Over Bluetooth1
                    Non-Standard Port
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                    Deobfuscate/Decode Files or Information
                    1
                    Credentials in Registry
                    114
                    System Information Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    Automated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
                    Obfuscated Files or Information
                    NTDS1
                    Query Registry
                    Distributed Component Object Model1
                    Input Capture
                    Scheduled Transfer11
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script3
                    Software Packing
                    LSA Secrets211
                    Security Software Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Masquerading
                    Cached Domain Credentials1
                    Process Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items131
                    Virtualization/Sandbox Evasion
                    DCSync131
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem1
                    Application Window Discovery
                    Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
                    Remote System Discovery
                    Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 680371 Sample: PAYMENT-ADVICE.exe Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 42 Malicious sample detected (through community Yara rule) 2->42 44 Yara detected AgentTesla 2->44 46 Yara detected AntiVM3 2->46 48 6 other signatures 2->48 7 PAYMENT-ADVICE.exe 7 2->7         started        process3 file4 26 C:\Users\user\AppData\...\rNFzixmDCD.exe, PE32 7->26 dropped 28 C:\Users\...\rNFzixmDCD.exe:Zone.Identifier, ASCII 7->28 dropped 30 C:\Users\user\AppData\Local\...\tmpA427.tmp, XML 7->30 dropped 32 C:\Users\user\...\PAYMENT-ADVICE.exe.log, ASCII 7->32 dropped 50 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->50 52 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->52 54 Uses schtasks.exe or at.exe to add and modify task schedules 7->54 56 2 other signatures 7->56 11 PAYMENT-ADVICE.exe 2 7->11         started        16 BackgroundTransferHost.exe 13 7->16         started        18 powershell.exe 25 7->18         started        20 2 other processes 7->20 signatures5 process6 dnsIp7 36 mail.waytogochile.com 11->36 38 waytogochile.com 50.87.144.250, 49742, 587 UNIFIEDLAYER-AS-1US United States 11->38 40 windowsupdatebg.s.llnwi.net 11->40 34 C:\Windows\System32\drivers\etc\hosts, ASCII 11->34 dropped 58 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->58 60 Tries to steal Mail credentials (via file / registry access) 11->60 62 Tries to harvest and steal ftp login credentials 11->62 68 2 other signatures 11->68 64 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->64 66 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 16->66 22 conhost.exe 18->22         started        24 conhost.exe 20->24         started        file8 signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    PAYMENT-ADVICE.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\rNFzixmDCD.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLinkDownload
                    9.0.PAYMENT-ADVICE.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    SourceDetectionScannerLabelLink
                    waytogochile.com1%VirustotalBrowse
                    windowsupdatebg.s.llnwi.net0%VirustotalBrowse
                    mail.waytogochile.com1%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl00%URL Reputationsafe
                    http://www.fontbureau.comituoj0%Avira URL Cloudsafe
                    http://www.certplus.com/CRL/class3.crl00%URL Reputationsafe
                    http://ocsp.suscerte.gob.ve00%URL Reputationsafe
                    http://www.fontbureau.comessedc0%Avira URL Cloudsafe
                    http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
                    http://www.chambersign.org10%URL Reputationsafe
                    http://www.carterandcone.comno0%Avira URL Cloudsafe
                    http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz00%URL Reputationsafe
                    http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
                    http://ca.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                    http://www.suscerte.gob.ve/dpc00%URL Reputationsafe
                    http://www.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    http://policy.camerfirma.com00%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/Y0%URL Reputationsafe
                    http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/V0%URL Reputationsafe
                    http://cps.letsencrypt.org00%URL Reputationsafe
                    http://crl.ssc.lt/root-b/cacrl.crl00%URL Reputationsafe
                    http://microsoft.co0%URL Reputationsafe
                    http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G0%URL Reputationsafe
                    https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
                    http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf00%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://crl.microsfCC0%Avira URL Cloudsafe
                    http://www.globaltrust.info00%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/D0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://ac.economia.gob.mx/last.crl0G0%URL Reputationsafe
                    http://www.fontbureau.coma20%Avira URL Cloudsafe
                    http://www.jiyu-kobo.co.jp/Y0/0%URL Reputationsafe
                    http://www.carterandcone.comw0%URL Reputationsafe
                    http://crl.oces.trust2408.com/oces.crl00%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/j0%URL Reputationsafe
                    http://www.fontbureau.comals0%URL Reputationsafe
                    http://certs.oaticerts.com/repository/OATICA2.crl0%URL Reputationsafe
                    http://certs.oati.net/repository/OATICA2.crt00%URL Reputationsafe
                    http://www.accv.es000%URL Reputationsafe
                    http://www.fontbureau.comFV0%Avira URL Cloudsafe
                    http://web.ncdc.gov.sa/crl/nrcaparta1.crl0%URL Reputationsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://www.acabogacia.org00%URL Reputationsafe
                    http://www.fontbureau.comgritaY0%Avira URL Cloudsafe
                    http://www.founder.c0%URL Reputationsafe
                    https://api.ipify.org%%startupfolder%0%URL Reputationsafe
                    http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
                    http://www.agesic.gub.uy/acrn/acrn.crl0)0%URL Reputationsafe
                    http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0%Avira URL Cloudsafe
                    http://www.carterandcone.comB0%URL Reputationsafe
                    http://www.rcsc.lt/repository00%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.zhongyicts.com.cnTC0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.carterandcone.comE0%URL Reputationsafe
                    http://x1.c.lencr.org/00%URL Reputationsafe
                    http://x1.i.lencr.org/00%URL Reputationsafe
                    http://www.correo.com.uy/correocert/cps.pdf00%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htmf0%Avira URL Cloudsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://waytogochile.com0%Avira URL Cloudsafe
                    http://certs.oaticerts.com/repository/OATICA2.crt080%URL Reputationsafe
                    http://cps.chambersign.org/cps/chambersignroot.html00%URL Reputationsafe
                    http://www.oaticerts.com/repository.0%URL Reputationsafe
                    http://www.ancert.com/cps00%URL Reputationsafe
                    http://ocsp.accv.es00%URL Reputationsafe
                    http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl00%URL Reputationsafe
                    http://www.echoworx.com/ca/root2/cps.pdf00%URL Reputationsafe
                    http://cSdGYD.com0%Avira URL Cloudsafe
                    http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz030%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                    http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl00%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    waytogochile.com
                    50.87.144.250
                    truefalseunknown
                    windowsupdatebg.s.llnwi.net
                    178.79.225.0
                    truefalseunknown
                    mail.waytogochile.com
                    unknown
                    unknowntrueunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317999412.0000000006A52000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comituojPAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245966630.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245990326.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.certplus.com/CRL/class3.crl0PAYMENT-ADVICE.exe, 00000009.00000003.317885982.0000000006C3A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.suscerte.gob.ve0PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.comessedcPAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245503899.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245464381.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.dhimyotis.com/certignarootca.crl0PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.446747240.0000000006C37000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.chambersign.org1PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317075496.0000000006CFC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://repository.swisssign.com/0PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designersPAYMENT-ADVICE.exe, 00000000.00000003.244266150.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.carterandcone.comnoPAYMENT-ADVICE.exe, 00000000.00000003.242187057.0000000005367000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241919573.0000000005364000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242690202.000000000536B000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242509856.0000000005365000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://crl.ssc.lt/root-c/cacrl.crl0PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://ca.disig.sk/ca/crl/ca_disig.crl0PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.445945425.0000000006CDB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.suscerte.gob.ve/dpc0PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.318051121.0000000006C32000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.disig.sk/ca/crl/ca_disig.crl0PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.445945425.0000000006CDB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/DPleasePAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.html5PAYMENT-ADVICE.exe, 00000000.00000003.245227416.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245043521.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244602175.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244869097.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244529636.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244785379.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244574340.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245196092.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244957508.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245070927.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244641952.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244727855.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244553519.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244841565.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244927047.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245173045.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244990804.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244810442.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244761242.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244620054.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.zhongyicts.com.cnPAYMENT-ADVICE.exe, 00000000.00000003.241093875.000000000538F000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePAYMENT-ADVICE.exe, 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.org%PAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              low
                              http://pki.registradores.org/normativa/index.htm0PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://policy.camerfirma.com0PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/YPAYMENT-ADVICE.exe, 00000000.00000003.242056881.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242132857.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241998865.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242223653.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241951986.000000000538E000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.anf.es/es/address-direccion.htmlPAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://www.anf.es/address/)1(0&PAYMENT-ADVICE.exe, 00000009.00000003.317885982.0000000006C3A000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317550868.0000000006CD3000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/VPAYMENT-ADVICE.exe, 00000000.00000003.242056881.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242132857.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241998865.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242573887.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242298115.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242621313.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242405955.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242821504.0000000005395000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242223653.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242596197.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242718773.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242445517.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242651071.000000000538E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://cps.letsencrypt.org0PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://crl.ssc.lt/root-b/cacrl.crl0PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://microsoft.coPAYMENT-ADVICE.exe, 00000009.00000003.445543359.0000000006A51000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.certicamara.com/dpc/0ZPAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0GPAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://crl.pki.wellsfargo.com/wsprca.crl0PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317999412.0000000006A52000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://wwww.certigna.fr/autorites/0mPAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0PAYMENT-ADVICE.exe, 00000009.00000003.317135049.0000000006CF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwPAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://www.anf.es/AC/ANFServerCA.crl0PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.microsfCCPAYMENT-ADVICE.exe, 00000009.00000003.445543359.0000000006A51000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.globaltrust.info0PAYMENT-ADVICE.exe, 00000009.00000002.515403329.00000000069CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/DPAYMENT-ADVICE.exe, 00000000.00000003.242056881.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242132857.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242573887.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242298115.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242621313.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242405955.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242821504.0000000005395000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242223653.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242596197.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242718773.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242445517.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242651071.000000000538E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/VPAYMENT-ADVICE.exe, 00000000.00000003.243968794.0000000005394000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.carterandcone.comlPAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://ac.economia.gob.mx/last.crl0GPAYMENT-ADVICE.exe, 00000009.00000003.317075496.0000000006CFC000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.coma2PAYMENT-ADVICE.exe, 00000000.00000003.250249996.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244356405.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244393260.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244308922.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244451182.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249004082.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244338184.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249191383.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249400543.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244288016.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249285616.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244471028.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249085609.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.244502148.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.jiyu-kobo.co.jp/Y0/PAYMENT-ADVICE.exe, 00000000.00000003.242298115.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242405955.000000000538E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.carterandcone.comwPAYMENT-ADVICE.exe, 00000000.00000003.241434338.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://crl.oces.trust2408.com/oces.crl0PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/jPAYMENT-ADVICE.exe, 00000000.00000003.242298115.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242621313.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242405955.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242821504.0000000005395000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242596197.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242718773.000000000538E000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242651071.000000000538E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://eca.hinet.net/repository0PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.fontbureau.comalsPAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245227416.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245196092.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245443702.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245070927.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245402109.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245256302.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245503899.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245173045.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245464381.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://certs.oaticerts.com/repository/OATICA2.crlPAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://certs.oati.net/repository/OATICA2.crt0PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.accv.es00PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fontbureau.comFVPAYMENT-ADVICE.exe, 00000000.00000003.245541059.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245612940.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245939337.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245227416.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245737324.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245697904.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245893190.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245915879.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245770538.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245196092.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245443702.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245675149.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245966630.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245402109.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245256302.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245503899.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245173045.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245464381.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245820046.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.245990326.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://web.ncdc.gov.sa/crl/nrcaparta1.crlPAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.datev.de/zertifikat-policy-int0PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.founder.com.cn/cn/bThePAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://boards.4chan.org/b/PAYMENT-ADVICE.exe, rNFzixmDCD.exe.0.drfalse
                                                      high
                                                      http://www.acabogacia.org0PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.firmaprofesional.com/cps0PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.fontbureau.comgritaYPAYMENT-ADVICE.exe, 00000000.00000003.250249996.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.282918228.0000000005394000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249004082.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249191383.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249400543.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249285616.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.249085609.0000000005394000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.founder.cPAYMENT-ADVICE.exe, 00000000.00000003.240620543.000000000538E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://api.ipify.org%%startupfolder%PAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        low
                                                        http://crl.securetrust.com/SGCA.crl0PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.agesic.gub.uy/acrn/acrn.crl0)PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://acraiz.icpbrasil.gov.br/LCRacraizv1.crlPAYMENT-ADVICE.exe, 00000009.00000003.317550868.0000000006CD3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://www.carterandcone.comBPAYMENT-ADVICE.exe, 00000000.00000003.241239656.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241179726.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241220651.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241332459.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241287867.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241495178.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241311661.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241434338.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241268186.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241479619.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241200143.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.241464737.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.rcsc.lt/repository0PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.typography.netDPAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.zhongyicts.com.cnTCPAYMENT-ADVICE.exe, 00000000.00000003.241093875.000000000538F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://fontfabrik.comPAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://web.certicamara.com/marco-legal0ZPAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.carterandcone.comEPAYMENT-ADVICE.exe, 00000000.00000003.241434338.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.quovadisglobal.com/cps0PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://x1.c.lencr.org/0PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://x1.i.lencr.org/0PAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.correo.com.uy/correocert/cps.pdf0PAYMENT-ADVICE.exe, 00000009.00000003.316775640.0000000006A51000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.galapagosdesign.com/staff/dennis.htmfPAYMENT-ADVICE.exe, 00000000.00000003.246677015.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.246650218.0000000005390000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://DynDns.comDynDNSnamejidpasswordPsi/PsiPAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.fonts.comPAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.sandoll.co.krPAYMENT-ADVICE.exe, 00000000.00000002.292161681.00000000065F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://waytogochile.comPAYMENT-ADVICE.exe, 00000009.00000002.511603322.00000000031D3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://certs.oaticerts.com/repository/OATICA2.crt08PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://cps.chambersign.org/cps/chambersignroot.html0PAYMENT-ADVICE.exe, 00000009.00000003.317075496.0000000006CFC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.anf.es/AC/RC/ocsp0cPAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.oaticerts.com/repository.PAYMENT-ADVICE.exe, 00000009.00000003.317176096.0000000006CE4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.ancert.com/cps0PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://ocsp.accv.es0PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0PAYMENT-ADVICE.exe, 00000009.00000003.317480011.0000000006CB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.echoworx.com/ca/root2/cps.pdf0PAYMENT-ADVICE.exe, 00000009.00000003.317570045.0000000006C3F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://rca.e-szigno.hu/ocsp0-PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://cSdGYD.comPAYMENT-ADVICE.exe, 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://eca.hinet.net/repository/CRL2/CA.crl0PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.datev.de/zertifikat-policy-std0PAYMENT-ADVICE.exe, 00000009.00000003.317936131.0000000006CAF000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.316952523.00000000069EE000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000003.317655861.0000000006CAE000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000009.00000002.516201934.0000000006CAE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.jiyu-kobo.co.jp/jp/PAYMENT-ADVICE.exe, 00000000.00000003.242445517.0000000005390000.00000004.00000800.00020000.00000000.sdmp, PAYMENT-ADVICE.exe, 00000000.00000003.242651071.000000000538E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0PAYMENT-ADVICE.exe, 00000009.00000003.317293236.0000000006CC3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      50.87.144.250
                                                                      waytogochile.comUnited States
                                                                      46606UNIFIEDLAYER-AS-1USfalse
                                                                      Joe Sandbox Version:35.0.0 Citrine
                                                                      Analysis ID:680371
                                                                      Start date and time: 08/08/202213:47:072022-08-08 13:47:07 +02:00
                                                                      Joe Sandbox Product:CloudBasic
                                                                      Overall analysis duration:0h 8m 17s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:light
                                                                      Sample file name:PAYMENT-ADVICE.exe
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                      Number of analysed new started processes analysed:33
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • HDC enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.adwa.spyw.evad.winEXE@12/11@2/1
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HDC Information:Failed
                                                                      HCA Information:
                                                                      • Successful, ratio: 92%
                                                                      • Number of executed functions: 0
                                                                      • Number of non-executed functions: 0
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Adjust boot time
                                                                      • Enable AMSI
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 23.211.6.115, 178.79.225.0, 209.197.3.8
                                                                      • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, arc.msn.com, wu-bg-shim.trafficmanager.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      TimeTypeDescription
                                                                      13:48:13API Interceptor688x Sleep call for process: PAYMENT-ADVICE.exe modified
                                                                      13:48:22API Interceptor44x Sleep call for process: powershell.exe modified
                                                                      No context
                                                                      No context
                                                                      No context
                                                                      No context
                                                                      No context
                                                                      Process:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      File Type:Microsoft Cabinet archive data, 61712 bytes, 1 file
                                                                      Category:dropped
                                                                      Size (bytes):61712
                                                                      Entropy (8bit):7.995044632446497
                                                                      Encrypted:true
                                                                      SSDEEP:1536:gzjJiDImMsrjCtGLaexX/zL09mX/lZHIxs:gPJiDI/sr0Hexv/0S/zx
                                                                      MD5:589C442FC7A0C70DCA927115A700D41E
                                                                      SHA1:66A07DACE3AFBFD1AA07A47E6875BEAB62C4BB31
                                                                      SHA-256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
                                                                      SHA-512:1B5FA79E52BE495C42CF49618441FB7012E28C02E7A08A91DA9213DB3AB810F0E83485BC1DD5F625A47D0BA7CFCDD5EA50ACC9A8DCEBB39F048C40F01E94155B
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:MSCF............,...................I........y.........Tf. .authroot.stl..W.`.4..CK..8U[...q.yL'sf!d.D..."2.2g.<dVI.!.....$).\...!2s..(...[.T7..{}...g....g.....w.km$.&|..qe.n.8+..&...O...`...+..C......`h!0.I.(C..1Q*L.p..".s..B.....H......fUP@..5...(X#.t.2lX.>.y|D.0Z0...M....I(.#.-... ...(.J....2..`.hO..{l+.bd7y.j..u.....3....<......3....s.T...._.'...%{v...s..............KgV.0..X=.A.9w9.Ea.x..........\.=.e.C2......9.......`.o... .......@pm.. a.....-M.....{...s.mW.....;.+...A......0.g..L9#.v.&O>./xSH.S.....GH.6.j...`2.(0g..... Lt........h4.iQ?....[.K.....uI......}.....d....M.....6q.Q~.0.\.'U^)`..u.....-........d..7...2.-.2+3.....A./.%Q...k...Q.,...H.B.%..O..x..5\...Hk.......B.';"Ym.'....X.l.E.6..a8.6..nq..x.r4..1t.....,..u.O..O.L...Uf...X.u.F .(.(.....".q...n{%U.-u....l6!....Z....~o0.}Q'.s.i....7...>4x...A.h.Mk].O.z.].6...53...b^;..>e..x.'1..\p.O.k..B1w..|..K.R.....2.e0..X.^...I...w..!.v5B]x..z.6.G^uF..].b.W...'..I.;..p..@L{.E..@W..3.&...
                                                                      Process:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      File Type:data
                                                                      Category:modified
                                                                      Size (bytes):290
                                                                      Entropy (8bit):2.9447851908702747
                                                                      Encrypted:false
                                                                      SSDEEP:3:kkFklK9E/ltfllXlE/6hpllGhlR6pFRltB+SliQlP8F+RlTRe86A+iRlERMta9bP:kK/+N+SkQlPlEGYRMY9z+4KlDA3RUe/
                                                                      MD5:1C14DE57307A1B51C7B11F7ED0B0ED6C
                                                                      SHA1:5D5542D686F4938EF7C1660470235765EF2708D9
                                                                      SHA-256:B9CBA7CC9ABCF706140DDC49727E92E182C855BB1A86FD29CCC737B3235895AC
                                                                      SHA-512:39C4E8933E0470127B5D82B17CF68D9129FF50CBB58A66F873303F6A83CEEB7B04B34891CF35758E9C24760E61A1F4EEBA06A8895CE87F0032E8401D770B8A50
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:p...... ............m...(....................................................... .........L.........................h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...
                                                                      Process:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:modified
                                                                      Size (bytes):1308
                                                                      Entropy (8bit):5.345811588615766
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                                      MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                                      SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                                      SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                                      SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                                      Malicious:true
                                                                      Reputation:high, very likely benign file
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):22248
                                                                      Entropy (8bit):5.601355512915253
                                                                      Encrypted:false
                                                                      SSDEEP:384:6PtCDT00R+dgN3SBKnNSjultIti7Y9gdSJ3xu1BMrmHZ1AV7mjcWwQ64I+iSY:Udw34K4CltS2dcN+4ajZA
                                                                      MD5:4735FDB06E86095FE7B6C1A487F76917
                                                                      SHA1:BC7A67AEE462A0EA89D644E49D58310B73CFD652
                                                                      SHA-256:D6FE2E815F67742E43AC2E1234AE4C765376E605AD8F3E52D2B20B282B0BD032
                                                                      SHA-512:87D6CB0D44C59B722E5398876157D0D0FFC3CF9550C8E2F506C1D98168E9EA21B3F7C68261FC89C5A59B39D437024BFE1CF1F75FC7D0513C08D26DF6434F1FF5
                                                                      Malicious:false
                                                                      Preview:@...e...........s...................?.n..............@..........H...............<@.^.L."My...:R..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:very short file (no magic)
                                                                      Category:dropped
                                                                      Size (bytes):1
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:U:U
                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                      Malicious:false
                                                                      Preview:1
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:very short file (no magic)
                                                                      Category:dropped
                                                                      Size (bytes):1
                                                                      Entropy (8bit):0.0
                                                                      Encrypted:false
                                                                      SSDEEP:3:U:U
                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                      Malicious:false
                                                                      Preview:1
                                                                      Process:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      File Type:XML 1.0 document, ASCII text
                                                                      Category:dropped
                                                                      Size (bytes):1597
                                                                      Entropy (8bit):5.1515491367200426
                                                                      Encrypted:false
                                                                      SSDEEP:24:2di4+S2qh/Q1K1y1mokUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNt7xvn:cge4MYrFdOFzOzN33ODOiDdKrsuTlv
                                                                      MD5:B768D0ABC5ABA4635FD8227222020095
                                                                      SHA1:C666124BA7B44AD460636DC2321A48E88ADE0ECB
                                                                      SHA-256:53B7D65D28A3BE473DC3AB09FF2A9C8B30062AC1F1BE3969D384B7BD313F1FD6
                                                                      SHA-512:42004A3F3EE326CAEDE5731DFD5620CFDC1427015118444405F04A3AB799198247AFF85CEC8AF36947803947E9C8A6EAB615572BD8EC98E1330157B9112A0BC9
                                                                      Malicious:true
                                                                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>computer\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>computer\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>computer\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <
                                                                      Process:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):1024000
                                                                      Entropy (8bit):7.481605845274099
                                                                      Encrypted:false
                                                                      SSDEEP:12288:5CSXZj4rDO3Koc+FI64Ap+1MUo4p/L2R6hT/0yAEfirpHhOtfI/4eAwRXIbUDbL+:5CTFqZ+zJhT/0yAJrIfIAe9IbUDHDls
                                                                      MD5:2D9F2C92D70A25AD42FE3602D7F932B1
                                                                      SHA1:CA8FB29BD419998B7F2DA87C49F1EB7B2C0700A0
                                                                      SHA-256:001709CADC8A0A856D91B9E3C9C0753AC8469D3C6CF2F532FDD53AEDB3A268D6
                                                                      SHA-512:8D71362C4074423EE1E8F48FB11332A0BA58ADD496AD65E0B83331F34029D58D9D347BB70B7F496C11FF9B6482A679389CEAFF78B088D782936720E2CAC8E163
                                                                      Malicious:true
                                                                      Yara Hits:
                                                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\rNFzixmDCD.exe, Author: Joe Security
                                                                      Antivirus:
                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....p.b..............0.................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......<+..............$................................................0..V........~....~*...(+.....,5.(....&r...p(,....+...r...p(....%.....~*...(+.....-..~.....(....&*...0..!........~....~*...(-.....,.~.....(....&*....0..\........s.....~....r/..p(/.....,..(0......~....(1...o2...&.r1..po2...&..o2...&..o2...&.o3...(.....*:..r]..p(.....*..0..\........s.....~....r/..p(/.....,..(0......~....(1...o2...&.ra..po2...&..o2...&..o2...&.o3...(.....*:..r]..p(.....*..0..\........s.....~
                                                                      Process:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):26
                                                                      Entropy (8bit):3.95006375643621
                                                                      Encrypted:false
                                                                      SSDEEP:3:ggPYV:rPYV
                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                      Malicious:true
                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):5789
                                                                      Entropy (8bit):5.402519732955
                                                                      Encrypted:false
                                                                      SSDEEP:96:BZ8hUN7qDo1ZBZRhUN7qDo1ZkUasjZLhUN7qDo1Z/dJ88EZP:S
                                                                      MD5:FA3066E2A7181FE4FCD73C6FA873E08D
                                                                      SHA1:5AE4181CA9BF0D2AE329A53D55D4A5AFC8B491DE
                                                                      SHA-256:E6AD590BEEE4C89503729349387C0450AD683BA4FCDDA8C91A9186DE3C16E79B
                                                                      SHA-512:A6B16C791A237EF34D1BC22763444022FCF3CD5C73DBFCDAE55FF7A815E33366E2804DBB8E797C2AF1DD5861EFDB29F3C85232B8B39C96B5235F448749124BE5
                                                                      Malicious:false
                                                                      Preview:.**********************..Windows PowerShell transcript start..Start time: 20220808134822..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 114127 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\rNFzixmDCD.exe..Process ID: 2404..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220808134822..**********************..PS>Add-MpPreference -ExclusionPath C:\Users\user\AppData\Roaming\rNFzixmDCD.exe..**********************..Windows PowerShell transcript start..Start time: 20220808135226..Username: computer\user..RunAs User: computer\hard
                                                                      Process:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):835
                                                                      Entropy (8bit):4.694294591169137
                                                                      Encrypted:false
                                                                      SSDEEP:24:QWDZh+ragzMZfuMMs1L/JU5fFCkK8T1rTt8:vDZhyoZWM9rU5fFcP
                                                                      MD5:6EB47C1CF858E25486E42440074917F2
                                                                      SHA1:6A63F93A95E1AE831C393A97158C526A4FA0FAAE
                                                                      SHA-256:9B13A3EA948A1071A81787AAC1930B89E30DF22CE13F8FF751F31B5D83E79FFB
                                                                      SHA-512:08437AB32E7E905EB11335E670CDD5D999803390710ED39CBC31A2D3F05868D5D0E5D051CCD7B06A85BB466932F99A220463D27FAC29116D241E8ADAC495FA2F
                                                                      Malicious:true
                                                                      Preview:# Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....127.0.0.1
                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.481605845274099
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Windows Screen Saver (13104/52) 0.07%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      File name:PAYMENT-ADVICE.exe
                                                                      File size:1024000
                                                                      MD5:2d9f2c92d70a25ad42fe3602d7f932b1
                                                                      SHA1:ca8fb29bd419998b7f2da87c49f1eb7b2c0700a0
                                                                      SHA256:001709cadc8a0a856d91b9e3c9c0753ac8469d3c6cf2f532fdd53aedb3a268d6
                                                                      SHA512:8d71362c4074423ee1e8f48fb11332a0ba58add496ad65e0b83331f34029d58d9d347bb70b7f496c11ff9b6482a679389ceaff78b088d782936720e2cac8e163
                                                                      SSDEEP:12288:5CSXZj4rDO3Koc+FI64Ap+1MUo4p/L2R6hT/0yAEfirpHhOtfI/4eAwRXIbUDbL+:5CTFqZ+zJhT/0yAJrIfIAe9IbUDHDls
                                                                      TLSH:0125AD17AFA47604E4F75BB8DC2B686183F63819617EE3792E905C9F2DFA301D40162B
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....p.b..............0.................. ........@.. ....................................@................................
                                                                      Icon Hash:c68ce86ecc8c8ac8
                                                                      Entrypoint:0x4ed116
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x62F070B8 [Mon Aug 8 02:11:04 2022 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      mov bh, 1Dh
                                                                      rol dword ptr [esi+ebp*2], 3Bh
                                                                      or byte ptr [ecx], FFFFFFD9h
                                                                      inc ebx
                                                                      or eax, 130476DCh
                                                                      imul ebp, dword ptr [ebx-3Bh], 17h
                                                                      mov dl, 4Dh
                                                                      xchg byte ptr [edx], bl
                                                                      add eax, B81E4750h
                                                                      in eax, dx
                                                                      or byte ptr [esi], ah
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xed0c40x4f.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xf00000xd4bc.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xfe0000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000xec4940xec600False0.7465595666975146data7.612937074384405IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0xf00000xd4bc0xd600False0.2765405957943925data3.7577588509475435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0xfe0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_ICON0xf01280x94a8dBase III DBT, version number 0, next free block index 40
                                                                      RT_ICON0xf95e00x25a8dBase III DBT, version number 0, next free block index 40
                                                                      RT_ICON0xfbb980x10a8data
                                                                      RT_ICON0xfcc500x468GLS_BINARY_LSB_FIRST
                                                                      RT_GROUP_ICON0xfd0c80x3edata
                                                                      RT_VERSION0xfd1180x3a0data
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Aug 8, 2022 13:48:39.032881021 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:39.200524092 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:39.203560114 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:39.721107006 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:39.721518993 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:39.890348911 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:39.890791893 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:40.058064938 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:40.095247984 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:40.272490978 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:40.272547007 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:40.272586107 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:40.272614002 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:40.272774935 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:40.274614096 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:40.306319952 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:40.473406076 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:40.535706043 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:43.449434996 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:43.633064032 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:43.636696100 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:43.803231955 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:43.804233074 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:44.010504007 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.029414892 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.030265093 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:44.196176052 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.196244955 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.196616888 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:44.403211117 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.463028908 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.463500023 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:44.629625082 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.629676104 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.630863905 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:44.631122112 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:44.631939888 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:44.631995916 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:44.796878099 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.796945095 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.797646999 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.797688961 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:44.798681974 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:45.036043882 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:48:45.189403057 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:48:45.189567089 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:50:18.638147116 CEST49742587192.168.2.350.87.144.250
                                                                      Aug 8, 2022 13:50:18.845161915 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:50:19.189120054 CEST5874974250.87.144.250192.168.2.3
                                                                      Aug 8, 2022 13:50:19.189923048 CEST49742587192.168.2.350.87.144.250
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Aug 8, 2022 13:48:38.640746117 CEST5592353192.168.2.38.8.8.8
                                                                      Aug 8, 2022 13:48:38.812478065 CEST53559238.8.8.8192.168.2.3
                                                                      Aug 8, 2022 13:48:38.851862907 CEST5772353192.168.2.38.8.8.8
                                                                      Aug 8, 2022 13:48:39.020261049 CEST53577238.8.8.8192.168.2.3
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                      Aug 8, 2022 13:48:38.640746117 CEST192.168.2.38.8.8.80x9f59Standard query (0)mail.waytogochile.comA (IP address)IN (0x0001)
                                                                      Aug 8, 2022 13:48:38.851862907 CEST192.168.2.38.8.8.80x6dcbStandard query (0)mail.waytogochile.comA (IP address)IN (0x0001)
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                      Aug 8, 2022 13:48:38.812478065 CEST8.8.8.8192.168.2.30x9f59No error (0)mail.waytogochile.comwaytogochile.comCNAME (Canonical name)IN (0x0001)
                                                                      Aug 8, 2022 13:48:38.812478065 CEST8.8.8.8192.168.2.30x9f59No error (0)waytogochile.com50.87.144.250A (IP address)IN (0x0001)
                                                                      Aug 8, 2022 13:48:39.020261049 CEST8.8.8.8192.168.2.30x6dcbNo error (0)mail.waytogochile.comwaytogochile.comCNAME (Canonical name)IN (0x0001)
                                                                      Aug 8, 2022 13:48:39.020261049 CEST8.8.8.8192.168.2.30x6dcbNo error (0)waytogochile.com50.87.144.250A (IP address)IN (0x0001)
                                                                      Aug 8, 2022 13:48:41.079037905 CEST8.8.8.8192.168.2.30xb186No error (0)windowsupdatebg.s.llnwi.net178.79.225.0A (IP address)IN (0x0001)
                                                                      Aug 8, 2022 13:48:41.079037905 CEST8.8.8.8192.168.2.30xb186No error (0)windowsupdatebg.s.llnwi.net95.140.230.128A (IP address)IN (0x0001)
                                                                      Aug 8, 2022 13:48:51.671696901 CEST8.8.8.8192.168.2.30x7f29No error (0)windowsupdatebg.s.llnwi.net178.79.225.128A (IP address)IN (0x0001)
                                                                      Aug 8, 2022 13:48:51.671696901 CEST8.8.8.8192.168.2.30x7f29No error (0)windowsupdatebg.s.llnwi.net178.79.225.0A (IP address)IN (0x0001)
                                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                                      Aug 8, 2022 13:48:39.721107006 CEST5874974250.87.144.250192.168.2.3220-gator2004.hostgator.com ESMTP Exim 4.95 #2 Mon, 08 Aug 2022 06:48:39 -0500
                                                                      220-We do not authorize the use of this system to transport unsolicited,
                                                                      220 and/or bulk e-mail.
                                                                      Aug 8, 2022 13:48:39.721518993 CEST49742587192.168.2.350.87.144.250EHLO 114127
                                                                      Aug 8, 2022 13:48:39.890348911 CEST5874974250.87.144.250192.168.2.3250-gator2004.hostgator.com Hello 114127 [102.129.143.3]
                                                                      250-SIZE 52428800
                                                                      250-8BITMIME
                                                                      250-PIPELINING
                                                                      250-PIPE_CONNECT
                                                                      250-AUTH PLAIN LOGIN
                                                                      250-STARTTLS
                                                                      250 HELP
                                                                      Aug 8, 2022 13:48:39.890791893 CEST49742587192.168.2.350.87.144.250STARTTLS
                                                                      Aug 8, 2022 13:48:40.058064938 CEST5874974250.87.144.250192.168.2.3220 TLS go ahead

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:13:48:04
                                                                      Start date:08/08/2022
                                                                      Path:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\PAYMENT-ADVICE.exe"
                                                                      Imagebase:0xe0000
                                                                      File size:1024000 bytes
                                                                      MD5 hash:2D9F2C92D70A25AD42FE3602D7F932B1
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.288114287.0000000003665000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.287162918.00000000027CE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.285145322.000000000255B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      Target ID:2
                                                                      Start time:13:48:09
                                                                      Start date:08/08/2022
                                                                      Path:C:\Windows\System32\BackgroundTransferHost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                      Imagebase:0x7ff6d4350000
                                                                      File size:36864 bytes
                                                                      MD5 hash:02BA81746B929ECC9DB6665589B68335
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:moderate

                                                                      Target ID:4
                                                                      Start time:13:48:17
                                                                      Start date:08/08/2022
                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\rNFzixmDCD.exe
                                                                      Imagebase:0x7ff73c930000
                                                                      File size:430592 bytes
                                                                      MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Reputation:high

                                                                      Target ID:5
                                                                      Start time:13:48:17
                                                                      Start date:08/08/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff7c9170000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:6
                                                                      Start time:13:48:18
                                                                      Start date:08/08/2022
                                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rNFzixmDCD" /XML "C:\Users\user\AppData\Local\Temp\tmpA427.tmp
                                                                      Imagebase:0x900000
                                                                      File size:185856 bytes
                                                                      MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:7
                                                                      Start time:13:48:22
                                                                      Start date:08/08/2022
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff7c9170000
                                                                      File size:625664 bytes
                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high

                                                                      Target ID:8
                                                                      Start time:13:48:24
                                                                      Start date:08/08/2022
                                                                      Path:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      Imagebase:0x80000
                                                                      File size:1024000 bytes
                                                                      MD5 hash:2D9F2C92D70A25AD42FE3602D7F932B1
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low

                                                                      Target ID:9
                                                                      Start time:13:48:24
                                                                      Start date:08/08/2022
                                                                      Path:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\Desktop\PAYMENT-ADVICE.exe
                                                                      Imagebase:0x800000
                                                                      File size:1024000 bytes
                                                                      MD5 hash:2D9F2C92D70A25AD42FE3602D7F932B1
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000000.280352342.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000009.00000000.280352342.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000009.00000000.280352342.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.506133681.0000000002E71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      Reputation:low

                                                                      No disassembly