Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
payment copy.exe

Overview

General Information

Sample Name:payment copy.exe
Analysis ID:756033
MD5:52fcd3f3cb7f0eaacc6cc393ba9313da
SHA1:5a7304f89ce6525e0449ffdf0022f5114d181680
SHA256:eeabb0a04ea59624d05185afbbf4a1c8e5db554c0c325871c4c0ac5de34c5547
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • payment copy.exe (PID: 6064 cmdline: C:\Users\user\Desktop\payment copy.exe MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
    • payment copy.exe (PID: 1848 cmdline: C:\Users\user\Desktop\payment copy.exe MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
  • WdFVsOe.exe (PID: 5864 cmdline: "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe" MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
    • WdFVsOe.exe (PID: 5304 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
  • WdFVsOe.exe (PID: 4640 cmdline: "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe" MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
    • WdFVsOe.exe (PID: 612 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
    • WdFVsOe.exe (PID: 2728 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "host39.registrar-servers.com", "Username": "Emenike@potashin.us", "Password": "})cZs aj5Xr;   C"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.310942786.000000000325E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 22 entries
            SourceRuleDescriptionAuthorStrings
            0.2.payment copy.exe.474a140.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.payment copy.exe.474a140.7.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.payment copy.exe.474a140.7.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x32c0b:$s10: logins
                • 0x32685:$s11: credential
                • 0x2e8d5:$g1: get_Clipboard
                • 0x2e8e3:$g2: get_Keyboard
                • 0x2e8f0:$g3: get_Password
                • 0x2fca0:$g4: get_CtrlKeyDown
                • 0x2fcb0:$g5: get_ShiftKeyDown
                • 0x2fcc1:$g6: get_AltKeyDown
                0.2.payment copy.exe.474a140.7.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
                • 0x300b6:$a13: get_DnsResolver
                • 0x2e7c3:$a20: get_LastAccessed
                • 0x30ae4:$a27: set_InternalServerPort
                • 0x30e19:$a30: set_GuidMasterKey
                • 0x2e8d5:$a33: get_Clipboard
                • 0x2e8e3:$a34: get_Keyboard
                • 0x2fcb0:$a35: get_ShiftKeyDown
                • 0x2fcc1:$a36: get_AltKeyDown
                • 0x2e8f0:$a37: get_Password
                • 0x2f40b:$a38: get_PasswordHash
                • 0x30518:$a39: get_DefaultCredentials
                1.0.payment copy.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 25 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: payment copy.exeReversingLabs: Detection: 30%
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeReversingLabs: Detection: 30%
                  Source: payment copy.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJoe Sandbox ML: detected
                  Source: 1.0.payment copy.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 0.2.payment copy.exe.474a140.7.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "host39.registrar-servers.com", "Username": "Emenike@potashin.us", "Password": "})cZs aj5Xr; C"}
                  Source: payment copy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: payment copy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Joe Sandbox ViewIP Address: 68.65.122.214 68.65.122.214
                  Source: global trafficTCP traffic: 192.168.2.3:49699 -> 68.65.122.214:587
                  Source: global trafficTCP traffic: 192.168.2.3:49699 -> 68.65.122.214:587
                  Source: payment copy.exe, 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: payment copy.exe, 00000001.00000002.541820691.000000000674E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.542427252.0000000006E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: payment copy.exe, 00000001.00000002.541820691.000000000674E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.micros
                  Source: WdFVsOe.exe, 0000000F.00000003.392037383.0000000006E4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://host39.registrar-servers.com
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com09
                  Source: WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://vpDUpe.com
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: payment copy.exe, 00000000.00000003.249126135.00000000062E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
                  Source: payment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                  Source: payment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comig
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: payment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comypo
                  Source: payment copy.exe, 00000000.00000003.250990543.000000000631E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.co
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: payment copy.exe, 00000000.00000003.250921715.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250791703.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250690710.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250751911.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250850742.000000000631E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: payment copy.exe, 00000000.00000003.251240828.00000000062E8000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250252956.00000000062E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8&
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: payment copy.exe, 00000000.00000003.250252956.00000000062E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersdF-
                  Source: payment copy.exe, 00000000.00000003.251240828.00000000062E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers~
                  Source: payment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comB.TTF
                  Source: payment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comldwatR8
                  Source: payment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247640305.00000000062FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: payment copy.exe, 00000000.00000003.247675536.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247640305.00000000062FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: payment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cndf
                  Source: payment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247497084.00000000062FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnht
                  Source: payment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247497084.00000000062FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnn
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: payment copy.exe, 00000000.00000003.250243768.00000000062DD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250205326.00000000062DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.95n
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: payment copy.exe, 00000000.00000003.246833567.00000000062E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.net
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: payment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn0
                  Source: payment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.m
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wINwvqrEjRpr.net
                  Source: WdFVsOe.exe, 0000000C.00000002.532509205.000000000357A000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wINwvqrEjRpr.net8
                  Source: payment copy.exe, 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                  Source: unknownDNS traffic detected: queries for: host39.registrar-servers.com

                  System Summary

                  barindex
                  Source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.payment copy.exe.34005e8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 11.2.WdFVsOe.exe.2f9063c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 11.2.WdFVsOe.exe.2f72e6c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.payment copy.exe.33e2e18.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: payment copy.exe PID: 6064, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: payment copy.exe PID: 1848, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: initial sampleStatic PE information: Filename: payment copy.exe
                  Source: 1.0.payment copy.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bB9A5F9D9u002d8564u002d4959u002dB9E5u002d6870FE15AC73u007d/u0033C0419E1u002d8030u002d4D25u002dB25Eu002d1005A86CEC6B.csLarge array initialization: .cctor: array initializer size 10947
                  Source: payment copy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.payment copy.exe.34005e8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 11.2.WdFVsOe.exe.2f9063c.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 11.2.WdFVsOe.exe.2f72e6c.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.payment copy.exe.33e2e18.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: payment copy.exe PID: 6064, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: payment copy.exe PID: 1848, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_018AFBEA0_2_018AFBEA
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_018AC1640_2_018AC164
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_018AE5A20_2_018AE5A2
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_018AE5B00_2_018AE5B0
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_07FA00400_2_07FA0040
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_07FA00060_2_07FA0006
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0319FAA01_2_0319FAA0
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BCC5AA1_2_05BCC5AA
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BC29F81_2_05BC29F8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BC09101_2_05BC0910
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BC00401_2_05BC0040
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BCD3181_2_05BCD318
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684076B1_2_0684076B
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684A5981_2_0684A598
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068452E81_2_068452E8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684C2F01_2_0684C2F0
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06847F881_2_06847F88
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06842F781_2_06842F78
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06845CB81_2_06845CB8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068467A91_2_068467A9
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684C2401_2_0684C240
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068420D01_2_068420D0
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684D0D31_2_0684D0D3
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06846FB81_2_06846FB8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06846DC81_2_06846DC8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06914A601_2_06914A60
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_069115CD1_2_069115CD
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_069153C81_2_069153C8
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 11_2_0142C16411_2_0142C164
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 11_2_0142E5A211_2_0142E5A2
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 11_2_0142E5B011_2_0142E5B0
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 11_2_0748004011_2_07480040
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 11_2_0748000611_2_07480006
                  Source: payment copy.exe, 00000000.00000000.243677634.000000000104E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameoghF.exeB vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrecision.dll6 vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameInspector.dllN vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1b1d9ce2-62fd-41b4-99a9-182e452ccf71.exe4 vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.267575287.0000000007D40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1b1d9ce2-62fd-41b4-99a9-182e452ccf71.exe4 vs payment copy.exe
                  Source: payment copy.exe, 00000001.00000002.508740371.00000000012F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs payment copy.exe
                  Source: payment copy.exe, 00000001.00000000.259132151.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename1b1d9ce2-62fd-41b4-99a9-182e452ccf71.exe4 vs payment copy.exe
                  Source: payment copy.exeBinary or memory string: OriginalFilenameoghF.exeB vs payment copy.exe
                  Source: payment copy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: WdFVsOe.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: payment copy.exeReversingLabs: Detection: 30%
                  Source: C:\Users\user\Desktop\payment copy.exeFile read: C:\Users\user\Desktop\payment copy.exeJump to behavior
                  Source: payment copy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\payment copy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\payment copy.exe C:\Users\user\Desktop\payment copy.exe
                  Source: C:\Users\user\Desktop\payment copy.exeProcess created: C:\Users\user\Desktop\payment copy.exe C:\Users\user\Desktop\payment copy.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: C:\Users\user\Desktop\payment copy.exeProcess created: C:\Users\user\Desktop\payment copy.exe C:\Users\user\Desktop\payment copy.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\payment copy.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\payment copy.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7046.tmpJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/4@3/1
                  Source: payment copy.exe, 00000000.00000000.243511449.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into User_Transportation(UserID,TransportationID) values (@UserID,@TransID);
                  Source: payment copy.exe, 00000000.00000000.243511449.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into TourPlace(Name,Location,TicketPrice) values (@name,@location,@ticket);
                  Source: payment copy.exe, 00000000.00000000.243511449.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into User_TourPlace(UserID,TourPlaceID) values (@UserID,@TourplaceID);
                  Source: payment copy.exe, 00000001.00000002.532660218.00000000035D2000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.532455798.0000000003575000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531618020.00000000036A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: payment copy.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\payment copy.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: payment copy.exeString found in binary or memory: AddUserButton'AddUserPhoneTextbox'AdduserEmailtextbox-Adduserpasswordtextbox
                  Source: payment copy.exeString found in binary or memory: Username:-AddusertextBoxUsernameCash
                  Source: 1.0.payment copy.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 1.0.payment copy.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: C:\Users\user\Desktop\payment copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\payment copy.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: payment copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: payment copy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_018AF972 pushad ; iretd 0_2_018AF979
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BCEEA3 push edi; retf 1_2_05BCEEA6
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BCEAF4 push es; iretd 1_2_05BCEAF7
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068418F7 push es; retf 1_2_0684193C
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068419C7 push es; retf 1_2_068419C8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068419CF push es; retf 1_2_068419D0
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068419CB push es; retf 1_2_068419CC
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068419D7 push es; retf 1_2_068419D8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068419D3 push es; retf 1_2_068419D4
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684197B push es; retf 1_2_0684197C
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.672485147748669
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.672485147748669
                  Source: C:\Users\user\Desktop\payment copy.exeFile created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to dropped file
                  Source: C:\Users\user\Desktop\payment copy.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOeJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOeJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\Desktop\payment copy.exeFile opened: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe:Zone.Identifier read attributes | deleteJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 0.2.payment copy.exe.34005e8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.WdFVsOe.exe.2f9063c.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.WdFVsOe.exe.2f72e6c.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.33e2e18.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.310942786.000000000325E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.262257256.00000000036CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.307766391.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 6064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 5864, type: MEMORYSTR
                  Source: payment copy.exe, 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000002.262257256.00000000036CE000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000B.00000002.310942786.000000000325E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000B.00000002.307766391.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000D.00000002.337625854.0000000002DC8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: payment copy.exe, 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000002.262257256.00000000036CE000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000B.00000002.310942786.000000000325E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000B.00000002.307766391.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000D.00000002.337625854.0000000002DC8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 6052Thread sleep time: -38122s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 6048Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -15679732462653109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -100000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 5208Thread sleep count: 9815 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99850s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99734s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99612s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99499s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99390s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99281s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99172s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99047s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98934s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98825s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98694s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98574s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98452s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98150s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98046s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97937s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97827s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97715s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97608s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97499s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97390s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97276s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 2064Thread sleep time: -38122s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 2400Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -19369081277395017s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -100000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 2384Thread sleep count: 9733 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99856s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99704s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99563s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99407s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99250s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99141s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99032s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98915s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98797s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98657s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98527s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98407s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98282s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98172s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98016s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97905s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97796s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97687s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97578s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97465s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97344s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97232s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 3408Thread sleep time: -38122s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1328Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -15679732462653109s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -100000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5164Thread sleep count: 9634 > 30
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99869s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99749s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99640s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99529s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99421s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99297s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99156s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99047s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98929s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98797s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98687s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98578s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98468s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98359s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98250s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98140s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98031s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -97906s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -97780s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -97671s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -97546s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -97437s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\payment copy.exeWindow / User API: threadDelayed 9815Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWindow / User API: threadDelayed 9733Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWindow / User API: threadDelayed 9634
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 38122Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99850Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99734Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99612Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99499Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99390Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99281Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99172Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99047Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98934Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98825Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98694Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98574Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98452Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98328Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98150Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98046Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97937Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97827Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97715Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97608Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97499Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97390Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97276Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 38122Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99856Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99704Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99563Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99407Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99250Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99141Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99032Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98915Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98797Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98657Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98527Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98407Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98282Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98172Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98016Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97905Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97796Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97687Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97578Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97465Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97344Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97232Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 38122Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 100000
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99869
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99749
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99640
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99529
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99421
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99297
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99156
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99047
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98929
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98797
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98687
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98578
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98468
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98359
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98250
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98140
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98031
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97906
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97780
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97671
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97546
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97437
                  Source: WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\payment copy.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06847F88 LdrInitializeThunk,1_2_06847F88
                  Source: C:\Users\user\Desktop\payment copy.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeProcess created: C:\Users\user\Desktop\payment copy.exe C:\Users\user\Desktop\payment copy.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Users\user\Desktop\payment copy.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Users\user\Desktop\payment copy.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 6064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 5304, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 2728, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\payment copy.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: Yara matchFile source: 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 5304, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 2728, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 6064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 5304, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 2728, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts211
                  Windows Management Instrumentation
                  1
                  Registry Run Keys / Startup Folder
                  11
                  Process Injection
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  114
                  System Information Discovery
                  Remote Services11
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default Accounts2
                  Command and Scripting Interpreter
                  Boot or Logon Initialization Scripts1
                  Registry Run Keys / Startup Folder
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Credentials in Registry
                  311
                  Security Software Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  Exfiltration Over Bluetooth1
                  Non-Standard Port
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                  Obfuscated Files or Information
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  Automated Exfiltration1
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
                  Software Packing
                  NTDS131
                  Virtualization/Sandbox Evasion
                  Distributed Component Object ModelInput CaptureScheduled Transfer11
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Masquerading
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common131
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials1
                  Remote System Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                  Process Injection
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  Hidden Files and Directories
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 756033 Sample: payment copy.exe Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 33 Malicious sample detected (through community Yara rule) 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 Yara detected AgentTesla 2->37 39 7 other signatures 2->39 6 WdFVsOe.exe 3 2->6         started        9 payment copy.exe 3 2->9         started        12 WdFVsOe.exe 2 2->12         started        process3 file4 41 Multi AV Scanner detection for dropped file 6->41 43 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->43 45 Machine Learning detection for dropped file 6->45 47 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->47 14 WdFVsOe.exe 3 6->14         started        29 C:\Users\user\...\payment copy.exe.log, ASCII 9->29 dropped 18 payment copy.exe 2 6 9->18         started        21 WdFVsOe.exe 3 12->21         started        23 WdFVsOe.exe 12->23         started        signatures5 process6 dnsIp7 31 host39.registrar-servers.com 68.65.122.214, 49699, 49700, 49701 NAMECHEAP-NETUS United States 18->31 25 C:\Users\user\AppData\Roaming\...\WdFVsOe.exe, PE32 18->25 dropped 27 C:\Users\user\...\WdFVsOe.exe:Zone.Identifier, ASCII 18->27 dropped 49 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->49 51 Tries to steal Mail credentials (via file / registry access) 18->51 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->53 55 Tries to harvest and steal ftp login credentials 21->55 57 Tries to harvest and steal browser information (history, passwords, etc) 21->57 file8 signatures9

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  payment copy.exe30%ReversingLabsWin32.Trojan.Woreflint
                  payment copy.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe30%ReversingLabsWin32.Trojan.Woreflint
                  SourceDetectionScannerLabelLinkDownload
                  1.0.payment copy.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://crl.microsoft0%URL Reputationsafe
                  http://crl.microsoft0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.com0%URL Reputationsafe
                  http://www.carterandcone.comypo0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.founder.com.cn/cnht0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cnn0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.typography.net0%URL Reputationsafe
                  http://www.fontbureau.comB.TTF0%URL Reputationsafe
                  http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.monotype.95n0%Avira URL Cloudsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.carterandcone.comig0%URL Reputationsafe
                  http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                  http://www.fontbureau.co0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.founder.com.cn/cn/0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.fontbureau.como0%URL Reputationsafe
                  http://crl.micros0%URL Reputationsafe
                  https://wINwvqrEjRpr.net80%Avira URL Cloudsafe
                  http://www.zhongyicts.com.cn00%Avira URL Cloudsafe
                  http://ocsp.sectigo.com090%Avira URL Cloudsafe
                  http://vpDUpe.com0%Avira URL Cloudsafe
                  http://www.founder.com.cn/cndf0%Avira URL Cloudsafe
                  https://wINwvqrEjRpr.net0%Avira URL Cloudsafe
                  http://www.fontbureau.comldwatR80%Avira URL Cloudsafe
                  http://www.zhongyicts.com.cno.m0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  host39.registrar-servers.com
                  68.65.122.214
                  truefalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://127.0.0.1:HTTP/1.1payment copy.exe, 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.fontbureau.com/designersGpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bThepayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8&payment copy.exe, 00000000.00000003.251240828.00000000062E8000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250252956.00000000062E8000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://crl.microsoftWdFVsOe.exe, 0000000F.00000003.392037383.0000000006E4C000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers?payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://vpDUpe.comWdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.monotype.95npayment copy.exe, 00000000.00000003.250243768.00000000062DD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250205326.00000000062DC000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://www.tiro.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cn0payment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designerspayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.krpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.compayment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comypopayment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnhtpayment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247497084.00000000062FD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netDpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/cThepayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnnpayment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247497084.00000000062FD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netpayment copy.exe, 00000000.00000003.246833567.00000000062E0000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comB.TTFpayment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://DynDns.comDynDNSnamejidpasswordPsi/PsiWdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://wINwvqrEjRpr.net8WdFVsOe.exe, 0000000C.00000002.532509205.000000000357A000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/DPleasepayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.ascendercorp.com/typedesigners.htmlpayment copy.exe, 00000000.00000003.249126135.00000000062E8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fonts.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sandoll.co.krpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleasepayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comigpayment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.apache.org/licenses/LICENSE-2.0payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designersdF-payment copy.exe, 00000000.00000003.250252956.00000000062E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://sectigo.com/CPS0payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://ocsp.sectigo.com09payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers~payment copy.exe, 00000000.00000003.251240828.00000000062E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://host39.registrar-servers.compayment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwpayment copy.exe, 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.copayment copy.exe, 00000000.00000003.250990543.000000000631E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cndfpayment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.carterandcone.comlpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cn/payment copy.exe, 00000000.00000003.247675536.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247640305.00000000062FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cnpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247640305.00000000062FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://wINwvqrEjRpr.netWdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designers/frere-jones.htmlpayment copy.exe, 00000000.00000003.250921715.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250791703.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250690710.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250751911.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250850742.000000000631E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.jiyu-kobo.co.jp/payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.comopayment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers8payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.zhongyicts.com.cno.mpayment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.comldwatR8payment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://crl.microspayment copy.exe, 00000001.00000002.541820691.000000000674E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                68.65.122.214
                                                host39.registrar-servers.comUnited States
                                                22612NAMECHEAP-NETUSfalse
                                                Joe Sandbox Version:36.0.0 Rainbow Opal
                                                Analysis ID:756033
                                                Start date and time:2022-11-29 14:54:07 +01:00
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 8m 36s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Sample file name:payment copy.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:18
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@11/4@3/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HDC Information:Failed
                                                HCA Information:
                                                • Successful, ratio: 95%
                                                • Number of executed functions: 62
                                                • Number of non-executed functions: 5
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                TimeTypeDescription
                                                14:55:04API Interceptor663x Sleep call for process: payment copy.exe modified
                                                14:55:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                14:55:22AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                14:55:25API Interceptor855x Sleep call for process: WdFVsOe.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                68.65.122.214payment swift.exeGet hashmaliciousBrowse
                                                  SWIFT Payment W076001.exeGet hashmaliciousBrowse
                                                    file.exeGet hashmaliciousBrowse
                                                      New Order.exeGet hashmaliciousBrowse
                                                        New Order.exeGet hashmaliciousBrowse
                                                          RFQ E22-0350 pdf.zip.exeGet hashmaliciousBrowse
                                                            file.exeGet hashmaliciousBrowse
                                                              file.exeGet hashmaliciousBrowse
                                                                SecuriteInfo.com.Win32.PWSX-gen.5615.5540.exeGet hashmaliciousBrowse
                                                                  65plwEdhrs.exeGet hashmaliciousBrowse
                                                                    PO-2100193237.xlsGet hashmaliciousBrowse
                                                                      NEW ORDER.exeGet hashmaliciousBrowse
                                                                        SecuriteInfo.com.Trojan.Packed2.44634.11417.32113.exeGet hashmaliciousBrowse
                                                                          SOA001.xlsGet hashmaliciousBrowse
                                                                            mW3lylpp53.exeGet hashmaliciousBrowse
                                                                              doc06983120221101093537.exeGet hashmaliciousBrowse
                                                                                Doc20220929105022.exeGet hashmaliciousBrowse
                                                                                  zfRyc49sNH.exeGet hashmaliciousBrowse
                                                                                    swiftcopy.xlsGet hashmaliciousBrowse
                                                                                      100% Advance Payment Needed.xlsGet hashmaliciousBrowse
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                        host39.registrar-servers.compayment swift.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        SWIFT Payment W076001.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        file.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        New Order.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        New Order.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        RFQ E22-0350 pdf.zip.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        file.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        file.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        SecuriteInfo.com.Win32.PWSX-gen.5615.5540.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        65plwEdhrs.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        PO-2100193237.xlsGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        NEW ORDER.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        SecuriteInfo.com.Trojan.Packed2.44634.11417.32113.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        SOA001.xlsGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        mW3lylpp53.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        doc06983120221101093537.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        Doc20220929105022.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        zfRyc49sNH.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        swiftcopy.xlsGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        100% Advance Payment Needed.xlsGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                        NAMECHEAP-NETUSpayment swift.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        https://myteachingvideo.org/nmp2aGet hashmaliciousBrowse
                                                                                        • 192.64.117.40
                                                                                        New PO-RJ-IN-003 - Knauf Queimados.exeGet hashmaliciousBrowse
                                                                                        • 198.54.121.81
                                                                                        PI-1366091200.jsGet hashmaliciousBrowse
                                                                                        • 198.54.122.135
                                                                                        JsX27X5dti.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.109
                                                                                        http://ideentiifire.comGet hashmaliciousBrowse
                                                                                        • 192.64.119.238
                                                                                        https://sites.google.com/view/uas-invite/homeGet hashmaliciousBrowse
                                                                                        • 199.192.16.22
                                                                                        FCA000200010005.PDF.exeGet hashmaliciousBrowse
                                                                                        • 162.0.228.17
                                                                                        BL-NO-OOLU2136901180.vbsGet hashmaliciousBrowse
                                                                                        • 198.54.117.216
                                                                                        Purchase Order No. 4502717956.exeGet hashmaliciousBrowse
                                                                                        • 162.213.255.142
                                                                                        https://jpnetworkbd.com/aab/index.php?atu-qui=6Get hashmaliciousBrowse
                                                                                        • 68.65.120.179
                                                                                        hZmf6K2R58.exeGet hashmaliciousBrowse
                                                                                        • 199.192.20.95
                                                                                        https://indd.adobe.com/view/afe6bfe7-4ef8-49fa-b099-03bbf908dd26Get hashmaliciousBrowse
                                                                                        • 162.0.235.22
                                                                                        paystub_11_24_2022.htmlGet hashmaliciousBrowse
                                                                                        • 68.65.122.77
                                                                                        SWIFT Payment W076001.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        file.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        file.exeGet hashmaliciousBrowse
                                                                                        • 198.54.115.69
                                                                                        New Order.exeGet hashmaliciousBrowse
                                                                                        • 68.65.122.214
                                                                                        Lakeringernes (1).exeGet hashmaliciousBrowse
                                                                                        • 162.0.238.93
                                                                                        https://robuxify.me/Get hashmaliciousBrowse
                                                                                        • 162.213.251.63
                                                                                        No context
                                                                                        No context
                                                                                        Process:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1216
                                                                                        Entropy (8bit):5.355304211458859
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                                        Malicious:false
                                                                                        Reputation:high, very likely benign file
                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                                        Process:C:\Users\user\Desktop\payment copy.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1216
                                                                                        Entropy (8bit):5.355304211458859
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                                        MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                                        SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                                        SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                                        SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                                        Malicious:true
                                                                                        Reputation:high, very likely benign file
                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                                        Process:C:\Users\user\Desktop\payment copy.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):963072
                                                                                        Entropy (8bit):7.666020966282773
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:yEhqU+PoxVZ861s4cEOSJJi0yIxYeQo//tdYV71JSYVBgrVDdzoa1cfN:LuoxL1MEPzyIBPY/JSMBgBDdEPf
                                                                                        MD5:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                                                        SHA1:5A7304F89CE6525E0449FFDF0022F5114D181680
                                                                                        SHA-256:EEABB0A04EA59624D05185AFBBF4A1C8E5DB554C0C325871C4C0AC5DE34C5547
                                                                                        SHA-512:7CE8744C23B517043B25F173733888385BE9FDAA67B597C3EC522D24D422ED1FEE9A44CFA51C7C6C3812FBC2FD791FE57A822E3C0A462670448FB0EE507C54EC
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 30%
                                                                                        Reputation:low
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....c..............0.............z.... ........@.. ....................... ............@.................................(...O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................\.......H.......<...........l...8u...S..........................................^..}.....(.......(.....*.0...........s......o......(.....*...0...........s......o......(.....*...0...........s......o......(.....*...0...........s......o......(.....*...0..+.........,..{.......+....,...{....o........(.....*..0..r.............(....s......s....}.....s....}.....s....}.....s....}.....(......{....(....o......{.....o......{.....o .....{....r...p"..@A...s!...o".....{....(#...o$.....{.... .... ..
                                                                                        Process:C:\Users\user\Desktop\payment copy.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):26
                                                                                        Entropy (8bit):3.95006375643621
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:ggPYV:rPYV
                                                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                        Malicious:true
                                                                                        Reputation:high, very likely benign file
                                                                                        Preview:[ZoneTransfer]....ZoneId=0
                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Entropy (8bit):7.666020966282773
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                        File name:payment copy.exe
                                                                                        File size:963072
                                                                                        MD5:52fcd3f3cb7f0eaacc6cc393ba9313da
                                                                                        SHA1:5a7304f89ce6525e0449ffdf0022f5114d181680
                                                                                        SHA256:eeabb0a04ea59624d05185afbbf4a1c8e5db554c0c325871c4c0ac5de34c5547
                                                                                        SHA512:7ce8744c23b517043b25f173733888385be9fdaa67b597c3ec522d24d422ed1fee9a44cfa51c7c6c3812fbc2fd791fe57a822e3c0a462670448fb0ee507c54ec
                                                                                        SSDEEP:12288:yEhqU+PoxVZ861s4cEOSJJi0yIxYeQo//tdYV71JSYVBgrVDdzoa1cfN:LuoxL1MEPzyIBPY/JSMBgBDdEPf
                                                                                        TLSH:3F25E08033A6BF71F5696BF37521800827763C6EA5E0D6285DCDB0DE2A76B5049F0B27
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c..............0.............z.... ........@.. ....................... ............@................................
                                                                                        Icon Hash:00828e8e8686b000
                                                                                        Entrypoint:0x4ec97a
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0x6385B1CA [Tue Nov 29 07:16:26 2022 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                        Instruction
                                                                                        jmp dword ptr [00402000h]
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xec9280x4f.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xee0000x388.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xf00000xc.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x20000xea9800xeaa00False0.8303174530500799data7.672485147748669IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0xee0000x3880x400False0.37109375data2.8467797153196712IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0xf00000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountry
                                                                                        RT_VERSION0xee0580x32cdata
                                                                                        DLLImport
                                                                                        mscoree.dll_CorExeMain
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Nov 29, 2022 14:55:25.424974918 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:25.592058897 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:25.592273951 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:25.895911932 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:25.905392885 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:26.075438023 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:26.075676918 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:26.248148918 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:26.295599937 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:26.479507923 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:26.479547024 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:26.479569912 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:26.479587078 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:26.479638100 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:26.479693890 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:26.481981993 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:26.535485983 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:26.703422070 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:26.763364077 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:26.930888891 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:26.933207035 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:27.102840900 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:27.103601933 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:27.310229063 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:27.324902058 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:27.326145887 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:27.492806911 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:27.492857933 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:27.493326902 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:27.666775942 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:27.667530060 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:27.835021019 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:27.837627888 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:27.837723017 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:27.838565111 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:27.838650942 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:28.008394957 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:28.008449078 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:28.008755922 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:28.014305115 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:28.155173063 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:56.683109999 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:56.851603031 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:56.852837086 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:57.171015978 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:57.173106909 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:57.341361046 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:57.341626883 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:57.512027979 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:57.544939995 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:57.730178118 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:57.730206966 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:57.730222940 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:57.730238914 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:57.730304956 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:57.732626915 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:57.747056007 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:57.915951967 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:57.997579098 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:58.166379929 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:58.166922092 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:58.335804939 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:58.336447954 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:58.521548033 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:58.522005081 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:58.691117048 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:58.691618919 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:58.867047071 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:58.867399931 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:59.037381887 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:59.038328886 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:59.038417101 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:59.038485050 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:59.038551092 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:55:59.217993021 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:59.218055964 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:59.227782011 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:59.227830887 CET5874970068.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:55:59.273787022 CET49700587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:06.216950893 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:06.384685993 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:06.384807110 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:06.619520903 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:06.620049000 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:06.790031910 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:06.793853045 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:06.964744091 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:06.980041027 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:07.162103891 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:07.162137032 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:07.162158966 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:07.162178993 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:07.162257910 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:07.165424109 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:07.167860031 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:07.336713076 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:07.392863035 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:07.420589924 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:07.599742889 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:07.603785038 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:07.772320032 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:07.782051086 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:07.966464043 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:07.968965054 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:08.137397051 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:08.139621973 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:08.321909904 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:08.329601049 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:08.508558989 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:08.509864092 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:08.510042906 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:08.510165930 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:08.510349035 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:56:08.677747965 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:08.677787066 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:08.679023027 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:08.709340096 CET5874970168.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:56:08.752382994 CET49701587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:57:05.351572990 CET49699587192.168.2.368.65.122.214
                                                                                        Nov 29, 2022 14:57:05.578685045 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:57:05.941483021 CET5874969968.65.122.214192.168.2.3
                                                                                        Nov 29, 2022 14:57:05.945311069 CET49699587192.168.2.368.65.122.214
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Nov 29, 2022 14:55:25.373497963 CET4997753192.168.2.38.8.8.8
                                                                                        Nov 29, 2022 14:55:25.394471884 CET53499778.8.8.8192.168.2.3
                                                                                        Nov 29, 2022 14:55:56.601288080 CET5784053192.168.2.38.8.8.8
                                                                                        Nov 29, 2022 14:55:56.621599913 CET53578408.8.8.8192.168.2.3
                                                                                        Nov 29, 2022 14:56:06.164307117 CET5799053192.168.2.38.8.8.8
                                                                                        Nov 29, 2022 14:56:06.181865931 CET53579908.8.8.8192.168.2.3
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Nov 29, 2022 14:55:25.373497963 CET192.168.2.38.8.8.80x8bf7Standard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                                                                        Nov 29, 2022 14:55:56.601288080 CET192.168.2.38.8.8.80x1adeStandard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                                                                        Nov 29, 2022 14:56:06.164307117 CET192.168.2.38.8.8.80xea32Standard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Nov 29, 2022 14:55:25.394471884 CET8.8.8.8192.168.2.30x8bf7No error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                                                                        Nov 29, 2022 14:55:56.621599913 CET8.8.8.8192.168.2.30x1adeNo error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                                                                        Nov 29, 2022 14:56:06.181865931 CET8.8.8.8192.168.2.30xea32No error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                                                                        TimestampSource PortDest PortSource IPDest IPCommands
                                                                                        Nov 29, 2022 14:55:25.895911932 CET5874969968.65.122.214192.168.2.3220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 08:55:25 -0500
                                                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                                                        220 and/or bulk e-mail.
                                                                                        Nov 29, 2022 14:55:25.905392885 CET49699587192.168.2.368.65.122.214EHLO 332260
                                                                                        Nov 29, 2022 14:55:26.075438023 CET5874969968.65.122.214192.168.2.3250-host39.registrar-servers.com Hello 332260 [102.129.143.49]
                                                                                        250-SIZE 52428800
                                                                                        250-8BITMIME
                                                                                        250-PIPELINING
                                                                                        250-PIPE_CONNECT
                                                                                        250-AUTH PLAIN LOGIN
                                                                                        250-STARTTLS
                                                                                        250 HELP
                                                                                        Nov 29, 2022 14:55:26.075676918 CET49699587192.168.2.368.65.122.214STARTTLS
                                                                                        Nov 29, 2022 14:55:26.248148918 CET5874969968.65.122.214192.168.2.3220 TLS go ahead
                                                                                        Nov 29, 2022 14:55:57.171015978 CET5874970068.65.122.214192.168.2.3220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 08:55:57 -0500
                                                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                                                        220 and/or bulk e-mail.
                                                                                        Nov 29, 2022 14:55:57.173106909 CET49700587192.168.2.368.65.122.214EHLO 332260
                                                                                        Nov 29, 2022 14:55:57.341361046 CET5874970068.65.122.214192.168.2.3250-host39.registrar-servers.com Hello 332260 [102.129.143.49]
                                                                                        250-SIZE 52428800
                                                                                        250-8BITMIME
                                                                                        250-PIPELINING
                                                                                        250-PIPE_CONNECT
                                                                                        250-AUTH PLAIN LOGIN
                                                                                        250-STARTTLS
                                                                                        250 HELP
                                                                                        Nov 29, 2022 14:55:57.341626883 CET49700587192.168.2.368.65.122.214STARTTLS
                                                                                        Nov 29, 2022 14:55:57.512027979 CET5874970068.65.122.214192.168.2.3220 TLS go ahead
                                                                                        Nov 29, 2022 14:56:06.619520903 CET5874970168.65.122.214192.168.2.3220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 08:56:06 -0500
                                                                                        220-We do not authorize the use of this system to transport unsolicited,
                                                                                        220 and/or bulk e-mail.
                                                                                        Nov 29, 2022 14:56:06.620049000 CET49701587192.168.2.368.65.122.214EHLO 332260
                                                                                        Nov 29, 2022 14:56:06.790031910 CET5874970168.65.122.214192.168.2.3250-host39.registrar-servers.com Hello 332260 [102.129.143.49]
                                                                                        250-SIZE 52428800
                                                                                        250-8BITMIME
                                                                                        250-PIPELINING
                                                                                        250-PIPE_CONNECT
                                                                                        250-AUTH PLAIN LOGIN
                                                                                        250-STARTTLS
                                                                                        250 HELP
                                                                                        Nov 29, 2022 14:56:06.793853045 CET49701587192.168.2.368.65.122.214STARTTLS
                                                                                        Nov 29, 2022 14:56:06.964744091 CET5874970168.65.122.214192.168.2.3220 TLS go ahead

                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:14:54:58
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\Desktop\payment copy.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\Desktop\payment copy.exe
                                                                                        Imagebase:0xf60000
                                                                                        File size:963072 bytes
                                                                                        MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.262257256.00000000036CE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                        Reputation:low

                                                                                        Target ID:1
                                                                                        Start time:14:55:05
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\Desktop\payment copy.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\Desktop\payment copy.exe
                                                                                        Imagebase:0xda0000
                                                                                        File size:963072 bytes
                                                                                        MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low

                                                                                        Target ID:11
                                                                                        Start time:14:55:22
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                                                                                        Imagebase:0xaf0000
                                                                                        File size:963072 bytes
                                                                                        MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000B.00000002.310942786.000000000325E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000B.00000002.307766391.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 30%, ReversingLabs
                                                                                        Reputation:low

                                                                                        Target ID:12
                                                                                        Start time:14:55:27
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                        Imagebase:0xcd0000
                                                                                        File size:963072 bytes
                                                                                        MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low

                                                                                        Target ID:13
                                                                                        Start time:14:55:30
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                                                                                        Imagebase:0x7c0000
                                                                                        File size:963072 bytes
                                                                                        MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Reputation:low

                                                                                        Target ID:14
                                                                                        Start time:14:55:39
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                        Imagebase:0x380000
                                                                                        File size:963072 bytes
                                                                                        MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low

                                                                                        Target ID:15
                                                                                        Start time:14:55:40
                                                                                        Start date:29/11/2022
                                                                                        Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                        Imagebase:0xdc0000
                                                                                        File size:963072 bytes
                                                                                        MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                                                        Has elevated privileges:false
                                                                                        Has administrator privileges:false
                                                                                        Programmed in:.Net C# or VB.NET
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:10.8%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:0%
                                                                                          Total number of Nodes:112
                                                                                          Total number of Limit Nodes:10
                                                                                          execution_graph 15630 7fa82e8 15631 7fa8473 15630->15631 15632 7fa830e 15630->15632 15632->15631 15634 7fa8568 PostMessageW 15632->15634 15635 7fa85d4 15634->15635 15635->15632 15636 18ab8f8 DuplicateHandle 15637 18ab98e 15636->15637 15638 18a98b0 15639 18a98f8 GetModuleHandleW 15638->15639 15640 18a98f2 15638->15640 15641 18a9925 15639->15641 15640->15639 15642 18ab6d0 GetCurrentProcess 15643 18ab74a GetCurrentThread 15642->15643 15644 18ab743 15642->15644 15645 18ab780 15643->15645 15646 18ab787 GetCurrentProcess 15643->15646 15644->15643 15645->15646 15649 18ab7bd 15646->15649 15647 18ab7e5 GetCurrentThreadId 15648 18ab816 15647->15648 15649->15647 15650 18a40d0 15651 18a40e2 15650->15651 15654 18a40ee 15651->15654 15656 18a41e0 15651->15656 15653 18a410d 15661 18a3c64 15654->15661 15657 18a4205 15656->15657 15665 18a42e0 15657->15665 15669 18a42d1 15657->15669 15662 18a3c6f 15661->15662 15677 18a51a4 15662->15677 15664 18a6a50 15664->15653 15667 18a4307 15665->15667 15666 18a43e4 15666->15666 15667->15666 15673 18a3de4 15667->15673 15671 18a4307 15669->15671 15670 18a43e4 15670->15670 15671->15670 15672 18a3de4 CreateActCtxA 15671->15672 15672->15670 15674 18a5370 CreateActCtxA 15673->15674 15676 18a5433 15674->15676 15678 18a51af 15677->15678 15681 18a57f8 15678->15681 15680 18a6af5 15680->15664 15682 18a5803 15681->15682 15685 18a5828 15682->15685 15684 18a6bda 15684->15680 15686 18a5833 15685->15686 15689 18a5858 15686->15689 15688 18a6cca 15688->15684 15690 18a5863 15689->15690 15692 18a73de 15690->15692 15695 18a9198 15690->15695 15691 18a741c 15691->15688 15692->15691 15699 18ab2f0 15692->15699 15704 18a91c2 15695->15704 15709 18a91d0 15695->15709 15696 18a91ae 15696->15692 15700 18ab321 15699->15700 15701 18ab345 15700->15701 15735 18ab5b8 15700->15735 15739 18ab5a9 15700->15739 15701->15691 15705 18a91d0 15704->15705 15713 18a92b8 15705->15713 15718 18a92c8 15705->15718 15706 18a91df 15706->15696 15711 18a92b8 LoadLibraryExW 15709->15711 15712 18a92c8 LoadLibraryExW 15709->15712 15710 18a91df 15710->15696 15711->15710 15712->15710 15714 18a92db 15713->15714 15715 18a92eb 15714->15715 15723 18a9948 15714->15723 15727 18a9958 15714->15727 15715->15706 15719 18a92db 15718->15719 15720 18a92eb 15719->15720 15721 18a9948 LoadLibraryExW 15719->15721 15722 18a9958 LoadLibraryExW 15719->15722 15720->15706 15721->15720 15722->15720 15724 18a996c 15723->15724 15725 18a9991 15724->15725 15731 18a94b8 15724->15731 15725->15715 15728 18a996c 15727->15728 15729 18a9991 15728->15729 15730 18a94b8 LoadLibraryExW 15728->15730 15729->15715 15730->15729 15732 18a9b38 LoadLibraryExW 15731->15732 15734 18a9bb1 15732->15734 15734->15725 15736 18ab5c5 15735->15736 15737 18ab5ff 15736->15737 15744 18a97b8 15736->15744 15737->15701 15740 18ab525 15739->15740 15741 18ab5b2 15739->15741 15742 18ab5ff 15741->15742 15743 18a97b8 2 API calls 15741->15743 15742->15701 15743->15742 15745 18a97be 15744->15745 15747 18ac2f8 15745->15747 15748 18a9880 15745->15748 15747->15747 15749 18a988b 15748->15749 15750 18ac367 15749->15750 15751 18a5858 2 API calls 15749->15751 15752 18ac375 15750->15752 15756 18ac3d0 15750->15756 15751->15750 15761 18ae0e8 15752->15761 15753 18ac3a0 15753->15747 15757 18ac383 15756->15757 15759 18ac3d6 15756->15759 15760 18ae0e8 LoadLibraryExW CreateWindowExW 15757->15760 15758 18ac3a0 15758->15752 15760->15758 15763 18ae119 15761->15763 15764 18ae20a 15761->15764 15762 18ae125 15762->15753 15763->15762 15768 18ae558 LoadLibraryExW 15763->15768 15769 18ae568 LoadLibraryExW 15763->15769 15764->15753 15765 18ae165 15766 18aef1f CreateWindowExW 15765->15766 15767 18aef30 CreateWindowExW 15765->15767 15766->15764 15767->15764 15768->15765 15769->15765

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 38 18afbea-18afc6c 39 18afc72-18afca0 38->39 39->39 40 18afca2-18afcec 39->40 42 18afcee-18afd18 call 18ade0c 40->42 43 18afd26-18afd9e 40->43 49 18afd1d-18afd1e 42->49 45 18afda9-18afdb0 43->45 46 18afda0-18afda6 43->46 47 18afdbb-18afe5a CreateWindowExW 45->47 48 18afdb2-18afdb8 45->48 46->45 51 18afe5c-18afe62 47->51 52 18afe63-18afe9b 47->52 48->47 51->52 56 18afea8 52->56 57 18afe9d-18afea0 52->57 58 18afea9 56->58 57->56 58->58
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b4f04bae4cb554cb75345c8a06c888ddc0e7c69942d886209dfd34e664b1b779
                                                                                          • Instruction ID: 5382652d56ca775eed6ec336d01c0b5e83b9e811caafbf563e07ed8da1a077f5
                                                                                          • Opcode Fuzzy Hash: b4f04bae4cb554cb75345c8a06c888ddc0e7c69942d886209dfd34e664b1b779
                                                                                          • Instruction Fuzzy Hash: E9915D718093889FDF02CFA5C8A46CDBFB1EF4A304F1985DAE544EB262D334A955CB51
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32 ref: 018AB730
                                                                                          • GetCurrentThread.KERNEL32 ref: 018AB76D
                                                                                          • GetCurrentProcess.KERNEL32 ref: 018AB7AA
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 018AB803
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: Current$ProcessThread
                                                                                          • String ID:
                                                                                          • API String ID: 2063062207-0
                                                                                          • Opcode ID: 7357cc7d02e5179b043e237a68711e161b98d58cf52c20fe51b4b524925c73f4
                                                                                          • Instruction ID: eaecfe1311c8ad50e396ed2af6574fffe8b2edbed39e266c715c92197c36e48d
                                                                                          • Opcode Fuzzy Hash: 7357cc7d02e5179b043e237a68711e161b98d58cf52c20fe51b4b524925c73f4
                                                                                          • Instruction Fuzzy Hash: 725157B4900289CFEB14CFA9D548BAEBFF1BF48304F24845AE909A7250DB746944CF65
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32 ref: 018AB730
                                                                                          • GetCurrentThread.KERNEL32 ref: 018AB76D
                                                                                          • GetCurrentProcess.KERNEL32 ref: 018AB7AA
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 018AB803
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: Current$ProcessThread
                                                                                          • String ID:
                                                                                          • API String ID: 2063062207-0
                                                                                          • Opcode ID: 702dd6c9e2b4102e0224d99177b3be27a595505ad1d2823cfbc4dfefca158782
                                                                                          • Instruction ID: 6e8a21d56ebc158dd54592f1548eb38a693b5642a4351fa5aa6709bc9ef16ef9
                                                                                          • Opcode Fuzzy Hash: 702dd6c9e2b4102e0224d99177b3be27a595505ad1d2823cfbc4dfefca158782
                                                                                          • Instruction Fuzzy Hash: 205144B4900249CFEB14CFAAD548BAEBFF1BF48314F248459E909A7250DB746984CF65
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 59 18afd38-18afd9e 60 18afda9-18afdb0 59->60 61 18afda0-18afda6 59->61 62 18afdbb-18afdf3 60->62 63 18afdb2-18afdb8 60->63 61->60 64 18afdfb-18afe5a CreateWindowExW 62->64 63->62 65 18afe5c-18afe62 64->65 66 18afe63-18afe9b 64->66 65->66 70 18afea8 66->70 71 18afe9d-18afea0 66->71 72 18afea9 70->72 71->70 72->72
                                                                                          APIs
                                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 018AFE4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateWindow
                                                                                          • String ID:
                                                                                          • API String ID: 716092398-0
                                                                                          • Opcode ID: 2f32e7c80dfbee936582ec30eca54758c9ba6a7b5358a96f9e3d7f290daf78ba
                                                                                          • Instruction ID: 05e2ba8b7160e0510d93fe00a31023d2f9fd684e5828478b0dbaf253462dfe40
                                                                                          • Opcode Fuzzy Hash: 2f32e7c80dfbee936582ec30eca54758c9ba6a7b5358a96f9e3d7f290daf78ba
                                                                                          • Instruction Fuzzy Hash: 2541D1B1D003499FEB14CF9AC884ADEBFB5BF48314F64812AE519AB210D7759945CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 73 18a5364-18a5431 CreateActCtxA 75 18a543a-18a5494 73->75 76 18a5433-18a5439 73->76 83 18a54a3-18a54a7 75->83 84 18a5496-18a5499 75->84 76->75 85 18a54b8 83->85 86 18a54a9-18a54b5 83->86 84->83 88 18a54b9 85->88 86->85 88->88
                                                                                          APIs
                                                                                          • CreateActCtxA.KERNEL32(?), ref: 018A5421
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create
                                                                                          • String ID:
                                                                                          • API String ID: 2289755597-0
                                                                                          • Opcode ID: 8990001860269e2486c84af4795c245dea88d41199ac80ddd9e4385a164f210a
                                                                                          • Instruction ID: 33bf96acc82c82fe2d5a8dc88896f9536b6c13e91b40015b9e33866478c87afb
                                                                                          • Opcode Fuzzy Hash: 8990001860269e2486c84af4795c245dea88d41199ac80ddd9e4385a164f210a
                                                                                          • Instruction Fuzzy Hash: 974113B1D01618CFEF14DFA9C8847CDBBB1BF49309F60806AD508AB251D7B55986CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 89 18a3de4-18a5431 CreateActCtxA 92 18a543a-18a5494 89->92 93 18a5433-18a5439 89->93 100 18a54a3-18a54a7 92->100 101 18a5496-18a5499 92->101 93->92 102 18a54b8 100->102 103 18a54a9-18a54b5 100->103 101->100 105 18a54b9 102->105 103->102 105->105
                                                                                          APIs
                                                                                          • CreateActCtxA.KERNEL32(?), ref: 018A5421
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create
                                                                                          • String ID:
                                                                                          • API String ID: 2289755597-0
                                                                                          • Opcode ID: 576d5f7eb54185505aea47b4d0d6096e3ce91493720e81db060780519b02ab33
                                                                                          • Instruction ID: 800634e4c9c3eaaf217946dd0bbb2deccb793ccbd06bb98b1f2847e4db1e2a37
                                                                                          • Opcode Fuzzy Hash: 576d5f7eb54185505aea47b4d0d6096e3ce91493720e81db060780519b02ab33
                                                                                          • Instruction Fuzzy Hash: 9641F3B0D0131CCBEB24DFAAC88478DBBB1BF49319F50805AD508AB251D7B56986CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 111 18ab8f8-18ab98c DuplicateHandle 112 18ab98e-18ab994 111->112 113 18ab995-18ab9b2 111->113 112->113
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 018AB97F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 1e1fa3c5ba871e2426a682a5f8cc041a6242062cc3b1b817e7fae3ea5caf928a
                                                                                          • Instruction ID: a97e92e22913996bbb015d7631f4dd3950eaa0e3a80d46d327122da41b0fc795
                                                                                          • Opcode Fuzzy Hash: 1e1fa3c5ba871e2426a682a5f8cc041a6242062cc3b1b817e7fae3ea5caf928a
                                                                                          • Instruction Fuzzy Hash: 6621E2B5D002589FDB10CFAAD984ADEBFF8EB48320F14841AE954A7310D378A954CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 106 18ab8f2-18ab98c DuplicateHandle 107 18ab98e-18ab994 106->107 108 18ab995-18ab9b2 106->108 107->108
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 018AB97F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 2fdff6065e72c95a736554c709244bb738b1f278f16973c1526f0c1c34eacffc
                                                                                          • Instruction ID: 33f383c623495ac0ccbae0169708964aee78d7d2ae67c75fd623bac5f907f339
                                                                                          • Opcode Fuzzy Hash: 2fdff6065e72c95a736554c709244bb738b1f278f16973c1526f0c1c34eacffc
                                                                                          • Instruction Fuzzy Hash: F22114B5D012589FDB10CFA9D584BDEBFF4EB48310F18841AE954A7210D378A954CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 116 18a94b8-18a9b78 118 18a9b7a-18a9b7d 116->118 119 18a9b80-18a9baf LoadLibraryExW 116->119 118->119 120 18a9bb8-18a9bd5 119->120 121 18a9bb1-18a9bb7 119->121 121->120
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,018A9991,00000800,00000000,00000000), ref: 018A9BA2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 285ac316effd94975a61f233c03527b53f8579571a45ccd57a49412267c21576
                                                                                          • Instruction ID: 2071a379b2f31019c622cd35c6cae33d3d0bb718177cbf53fb723aa90ac00620
                                                                                          • Opcode Fuzzy Hash: 285ac316effd94975a61f233c03527b53f8579571a45ccd57a49412267c21576
                                                                                          • Instruction Fuzzy Hash: BD1126B6D043598FEB10CF9AD444BDEFBF4EB88324F54842AD919A7600C375A945CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 124 18a9b30-18a9b78 125 18a9b7a-18a9b7d 124->125 126 18a9b80-18a9baf LoadLibraryExW 124->126 125->126 127 18a9bb8-18a9bd5 126->127 128 18a9bb1-18a9bb7 126->128 128->127
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,018A9991,00000800,00000000,00000000), ref: 018A9BA2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: 5f0887b36aca6e10ff0e5cc35db61f9739c642851bfa780491c619480c3ed163
                                                                                          • Instruction ID: fe560d34984387d98bd62349d15b624da69438704953157f39ffc46e9a6bbf04
                                                                                          • Opcode Fuzzy Hash: 5f0887b36aca6e10ff0e5cc35db61f9739c642851bfa780491c619480c3ed163
                                                                                          • Instruction Fuzzy Hash: 011147B6C003588FDB10CFA9C544BDEBBF4AF48314F04841AD955A7200C374A545CFA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 131 18a98b0-18a98f0 132 18a98f8-18a9923 GetModuleHandleW 131->132 133 18a98f2-18a98f5 131->133 134 18a992c-18a9940 132->134 135 18a9925-18a992b 132->135 133->132 135->134
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 018A9916
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: 972add06ed1b949d52c0121796d40ced8bacec2131a146b206ba6904f9f72028
                                                                                          • Instruction ID: cdb29f39fe861b164c95fd45bddedb29808a19508eaf0978965ce36a442672bd
                                                                                          • Opcode Fuzzy Hash: 972add06ed1b949d52c0121796d40ced8bacec2131a146b206ba6904f9f72028
                                                                                          • Instruction Fuzzy Hash: FF1110B5C002498FEB10CF9AC444BDEFBF4EB89324F54842AD969B7200D379A645CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 137 7fa8568-7fa85d2 PostMessageW 138 7fa85db-7fa85ef 137->138 139 7fa85d4-7fa85da 137->139 139->138
                                                                                          APIs
                                                                                          • PostMessageW.USER32(?,?,?,?), ref: 07FA85C5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.268309538.0000000007FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FA0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7fa0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 410705778-0
                                                                                          • Opcode ID: ca0a86921e6b78eedcdf5ce1267b5b2b068cc90f3df09df70c64805384916494
                                                                                          • Instruction ID: b2449c8f465d14943f0597550cdb89e83d6b25e6c8e9bf0e378087fabac8c2b0
                                                                                          • Opcode Fuzzy Hash: ca0a86921e6b78eedcdf5ce1267b5b2b068cc90f3df09df70c64805384916494
                                                                                          • Instruction Fuzzy Hash: 8011E5B58003499FDB10CF9AC985BDEBFF8EB48324F148819D955A7600C375A944CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 23137fe3ce3ee646de07e360bba3aa69774d100d00e06f5bb595de2868b6a476
                                                                                          • Instruction ID: d62b6ae22e2529d617a8ff65a0c200cbbc8017536fb42474eb48e916d030e2a7
                                                                                          • Opcode Fuzzy Hash: 23137fe3ce3ee646de07e360bba3aa69774d100d00e06f5bb595de2868b6a476
                                                                                          • Instruction Fuzzy Hash: 291292F54137468AE310EF65F9DC1C97BA1BB56328FB0C208D2612BAD9D7B8154ACF84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 13b0f10b5a7e571fb8d72c0ea023f1ca27f8de4907532ce5a705816126d8d98d
                                                                                          • Instruction ID: fd8bf2c9164f5b215ca81746b2b6839ac2542871b8c996488effbe23301c071c
                                                                                          • Opcode Fuzzy Hash: 13b0f10b5a7e571fb8d72c0ea023f1ca27f8de4907532ce5a705816126d8d98d
                                                                                          • Instruction Fuzzy Hash: 29A16E36E0021A8FDF05DFE9C8445DEBBB2FF84300B55856AE905EB261DB35AA45CF40
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.260952608.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_18a0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 372203e21023628ee1d7535baa8c1e1f556d0294f3dd31feb3be37d5ee83d099
                                                                                          • Instruction ID: 3d52535fc506ce0653277a16df667fe4a662240359cd426cfd664b962842d48e
                                                                                          • Opcode Fuzzy Hash: 372203e21023628ee1d7535baa8c1e1f556d0294f3dd31feb3be37d5ee83d099
                                                                                          • Instruction Fuzzy Hash: 63C108B14137468AE710EF64F8DC1C97BB1BB86328F71C208D1612BAD9D7B8144ACF84
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.268309538.0000000007FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FA0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7fa0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 496e3bffc9a37b68089088e85fa7fd3da9ed4210d350a8409bd54ddeb8d03864
                                                                                          • Instruction ID: 0393588ed8489f7f15982c2b38df6d6cf278fd20f9d66874efd110e99e016dac
                                                                                          • Opcode Fuzzy Hash: 496e3bffc9a37b68089088e85fa7fd3da9ed4210d350a8409bd54ddeb8d03864
                                                                                          • Instruction Fuzzy Hash: 1F4162B1D056588BE719CF6B9D406CAFBF3AFC9210F09C1B6C44CAA225EB350A568F15
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.268309538.0000000007FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FA0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7fa0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f0c67377062e35486640f97bface341b8b08f11d4b71e8a8823327e446f3fc4a
                                                                                          • Instruction ID: b626100c8f962908185817e96d639244238be85535f18ee91a7ba4c7042e4dd7
                                                                                          • Opcode Fuzzy Hash: f0c67377062e35486640f97bface341b8b08f11d4b71e8a8823327e446f3fc4a
                                                                                          • Instruction Fuzzy Hash: 774131B1D416199BEB1CCF6B9D4079AFAF3AFC8200F18C1FA951CA6214EB754A918F11
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Execution Graph

                                                                                          Execution Coverage:11.7%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:4.1%
                                                                                          Total number of Nodes:122
                                                                                          Total number of Limit Nodes:8
                                                                                          execution_graph 56279 3190b48 56280 3190b89 Sleep 56279->56280 56281 3190bb6 56280->56281 56282 3190448 56283 3190455 56282->56283 56286 3190868 56283->56286 56284 319045b 56288 319086b 56286->56288 56287 31909bb 56287->56284 56288->56287 56289 3190ad3 VirtualAllocExNuma 56288->56289 56290 3190b0d 56289->56290 56290->56284 56349 69176b0 56350 69176cf 56349->56350 56351 6917938 56350->56351 56352 6917c78 RegQueryValueExW 56350->56352 56354 69179c0 56350->56354 56352->56350 56355 6917a12 RegOpenKeyExW 56354->56355 56357 6917a86 56355->56357 56357->56357 56358 319bbf8 56359 319bc16 56358->56359 56362 319b7d4 56359->56362 56361 319bc4d 56364 319d718 LoadLibraryA 56362->56364 56365 319d7f4 56364->56365 56419 6918620 56420 691863f LdrInitializeThunk 56419->56420 56422 6918690 56420->56422 56291 691a386 56292 691a395 56291->56292 56295 691a8d1 56292->56295 56293 691a39d 56297 691a89d 56295->56297 56296 691ab7c 56296->56293 56297->56295 56297->56296 56298 691bbf0 GlobalMemoryStatusEx GlobalMemoryStatusEx 56297->56298 56299 691bbe0 GlobalMemoryStatusEx GlobalMemoryStatusEx 56297->56299 56302 691ad38 56297->56302 56305 691ab98 56297->56305 56298->56297 56299->56297 56310 691ae00 56302->56310 56306 691abb9 56305->56306 56307 691abdc 56305->56307 56306->56297 56308 691ac09 56307->56308 56309 691ae00 2 API calls 56307->56309 56308->56297 56309->56308 56311 691ae14 56310->56311 56313 691ad5f 56310->56313 56316 691ae00 2 API calls 56311->56316 56312 691ae2a 56317 691bbf0 56312->56317 56326 691bbe0 56312->56326 56313->56297 56316->56312 56318 691bbfb 56317->56318 56320 691bc23 56317->56320 56318->56313 56319 691bc79 56319->56313 56320->56319 56321 691bd17 56320->56321 56324 691bd25 56320->56324 56322 691ad38 2 API calls 56321->56322 56323 691bd1e 56322->56323 56323->56313 56324->56323 56334 691c0e8 56324->56334 56328 691bbf0 56326->56328 56327 691bbfb 56327->56313 56328->56327 56329 691bd17 56328->56329 56331 691bd25 56328->56331 56330 691ad38 2 API calls 56329->56330 56332 691bd1e 56330->56332 56331->56332 56333 691c0e8 2 API calls 56331->56333 56332->56313 56333->56332 56337 691c120 56334->56337 56335 691c0f6 56335->56323 56338 691c155 56337->56338 56339 691c12d 56337->56339 56345 6918ba4 56338->56345 56339->56335 56341 691c176 56341->56335 56343 691c23e GlobalMemoryStatusEx 56344 691c26e 56343->56344 56344->56335 56346 691c1f8 GlobalMemoryStatusEx 56345->56346 56348 691c172 56346->56348 56348->56341 56348->56343 56366 3194cb0 56367 3194cc4 56366->56367 56370 3195302 56367->56370 56368 3194ccd 56371 319530b 56370->56371 56376 31953e8 56370->56376 56381 31953d7 56370->56381 56386 31954e4 56370->56386 56391 31954fe 56370->56391 56371->56368 56377 319542c 56376->56377 56378 3195523 56377->56378 56396 31957df 56377->56396 56405 31957f0 56377->56405 56382 319542c 56381->56382 56383 3195523 56382->56383 56384 31957df 3 API calls 56382->56384 56385 31957f0 3 API calls 56382->56385 56384->56383 56385->56383 56387 3195497 56386->56387 56388 3195523 56387->56388 56389 31957df 3 API calls 56387->56389 56390 31957f0 3 API calls 56387->56390 56389->56388 56390->56388 56392 3195511 56391->56392 56393 3195523 56391->56393 56394 31957df 3 API calls 56392->56394 56395 31957f0 3 API calls 56392->56395 56394->56393 56395->56393 56397 31957ea 56396->56397 56399 3195855 56396->56399 56402 31957df 2 API calls 56397->56402 56411 3195832 56397->56411 56415 3195840 56397->56415 56398 319580e 56398->56378 56400 31958cd 56399->56400 56401 31958a4 RtlEncodePointer 56399->56401 56400->56378 56401->56400 56402->56398 56406 31957fe 56405->56406 56408 31957df 3 API calls 56406->56408 56409 3195840 RtlEncodePointer 56406->56409 56410 3195832 RtlEncodePointer 56406->56410 56407 319580e 56407->56378 56408->56407 56409->56407 56410->56407 56412 319587a 56411->56412 56413 31958cd 56412->56413 56414 31958a4 RtlEncodePointer 56412->56414 56413->56398 56414->56413 56416 319587a 56415->56416 56417 31958a4 RtlEncodePointer 56416->56417 56418 31958cd 56416->56418 56417->56418 56418->56398 56274 6847f88 56275 6847fa9 56274->56275 56276 6847ff9 56275->56276 56277 6848417 LdrInitializeThunk 56275->56277 56278 6848433 56277->56278

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 640 6847f88-6847ff7 649 6848010-684802b 640->649 650 6847ff9-684800f 640->650 655 6848031-684803a 649->655 656 6848319-6848323 649->656 657 6848040-6848057 655->657 658 6848329-684834f 655->658 661 6848304-6848308 657->661 662 684805d-6848066 657->662 663 6848374-684839f 658->663 664 6848351-684835b 658->664 666 6848324 661->666 667 684830a-6848313 661->667 662->658 665 684806c-684809a 662->665 673 68483c4-684842c LdrInitializeThunk 663->673 674 68483a1-68483ab 663->674 668 6848370-6848373 664->668 669 684835d-684836e 664->669 684 68480a0-6848117 665->684 685 68482ef-68482f3 665->685 666->658 667->655 667->656 669->668 689 6848433-684843f 673->689 675 68483c0-68483c3 674->675 676 68483ad-68483be 674->676 676->675 725 684811d-6848139 684->725 726 68482d9-68482ea 684->726 685->666 687 68482f5-68482fe 685->687 687->661 687->662 690 6848445-684844e 689->690 691 6848640-6848653 689->691 694 6848454-6848469 690->694 695 6848675 690->695 693 684867a-684867e 691->693 697 6848680 693->697 698 6848689 693->698 701 6848483-684849e 694->701 702 684846b-684847e 694->702 695->693 697->698 703 684868a 698->703 716 68484a0-68484aa 701->716 717 68484ac 701->717 704 6848614-6848618 702->704 703->703 707 6848623-684862c 704->707 708 684861a 704->708 712 6848670 707->712 713 684862e-684863a 707->713 708->707 712->695 713->690 713->691 718 68484b1-68484b3 716->718 717->718 720 68484b5-68484c8 718->720 721 68484cd-6848566 call 6840aa0 * 2 718->721 720->704 771 6848574 721->771 772 6848568-6848572 721->772 731 6848181-6848256 725->731 732 684813b-6848142 725->732 726->685 731->685 790 684825c-684826b 731->790 732->726 734 6848148-6848169 732->734 734->731 747 684816b-6848171 734->747 749 6848175-6848177 747->749 750 6848173 747->750 749->731 750->731 774 6848579-684857b 771->774 772->774 775 684857d-684857f 774->775 776 68485be-6848612 774->776 778 6848581-684858b 775->778 779 684858d 775->779 776->704 781 6848592-6848594 778->781 779->781 781->776 783 6848596-68485bc 781->783 783->776 790->685 791 6848271-6848273 790->791 791->685 794 6848275-6848281 791->794 794->685 796 6848283-68482d7 794->796 796->685
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.542335263.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6840000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 9e838fc2e4a9d963cd4dd2fd30fb8358ce9d270190522c033c8afe796df3866d
                                                                                          • Instruction ID: 63171817b18fca80ba9774548a49e00b9b35abcbdd9a4452a3c78c0def87447f
                                                                                          • Opcode Fuzzy Hash: 9e838fc2e4a9d963cd4dd2fd30fb8358ce9d270190522c033c8afe796df3866d
                                                                                          • Instruction Fuzzy Hash: 14129D70B002099FDB58EBB4D858BAE77B2AF88348F158429E506DB394DF78DC41CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 809 3190868-3190869 810 319088b-3190891 809->810 811 319086b-3190871 809->811 812 3190893-3190896 810->812 811->812 813 3190873-3190889 811->813 814 31908e9-31908ec 812->814 815 3190898-31908e4 812->815 813->810 816 31908fb-31908fe 814->816 817 31908ee 814->817 815->814 819 3190900 816->819 820 3190905-3190908 816->820 821 31908f6 817->821 819->820 822 319090a-319093a 820->822 823 3190943-3190946 820->823 821->816 824 319099a 822->824 825 319093c 822->825 826 3190948-3190968 call 319042c 823->826 827 3190975-3190978 823->827 873 319099a call 3190bd0 824->873 874 319099a call 3190be0 824->874 825->824 830 319093e 825->830 848 319096d-3190970 826->848 828 319097a 827->828 829 3190985-3190988 827->829 835 3190980 828->835 831 319098a-319098e 829->831 832 3190995-3190998 829->832 830->823 836 31909ff-3190a1b 831->836 837 3190990 831->837 832->824 838 31909a5-31909a8 832->838 833 31909a0 833->838 835->829 855 3190a20-3190a23 836->855 837->832 840 31909aa-31909ac call 3190554 838->840 841 31909b6-31909b9 838->841 847 31909b1 840->847 845 31909bb-31909c2 841->845 846 31909c3-31909c6 841->846 849 31909c8-31909e1 846->849 850 31909ea-31909ed 846->850 847->841 848->827 859 31909e3-31909e5 849->859 860 3190a47-3190a72 849->860 852 31909fa-31909fd 850->852 853 31909ef 850->853 852->836 852->855 875 31909ef call 319281c 853->875 876 31909ef call 3192731 853->876 877 31909ef call 3192740 853->877 857 3190a2d-3190a2f 855->857 858 3190a25-3190a2c 855->858 862 3190a31 857->862 863 3190a36-3190a39 857->863 859->850 866 3190ab8-3190b0b VirtualAllocExNuma 860->866 867 3190a74-3190ab7 860->867 861 31909f5 861->852 862->863 863->812 864 3190a3f-3190a46 863->864 869 3190b0d-3190b13 866->869 870 3190b14-3190b31 866->870 867->866 869->870 873->833 874->833 875->861 876->861 877->861
                                                                                          APIs
                                                                                          • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 03190AFE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.517584802.0000000003190000.00000040.00000800.00020000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_3190000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocNumaVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 4233825816-0
                                                                                          • Opcode ID: 4b8a21aad613f8b4ce92d47589572ea3036e256e75850260b1bceb230241b9ce
                                                                                          • Instruction ID: 19ff621f4197c59d86ea2a8f429b0fee484a418cd5dedf1228ab13a68a889e1f
                                                                                          • Opcode Fuzzy Hash: 4b8a21aad613f8b4ce92d47589572ea3036e256e75850260b1bceb230241b9ce
                                                                                          • Instruction Fuzzy Hash: 3281D371E002488FEF24DBA9D8847ADBBB8EF4E324F1444ABE519E7291D7349C45CB91
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 878 6918620-691868a LdrInitializeThunk 886 6918690-69186aa 878->886 887 69187d3-69187f0 878->887 886->887 890 69186b0-69186ca 886->890 899 69187f5-69187fe 887->899 894 69186d0 890->894 895 69186cc-69186ce 890->895 896 69186d3-691872e 894->896 895->896 905 6918730-6918732 896->905 906 6918734 896->906 907 6918737-69187d1 905->907 906->907 907->899
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.542766037.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6910000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 3298c2249680c0525d7f2c567fe4d93689637ddd8d27e5b0748b3221fa44b483
                                                                                          • Instruction ID: a52e7dff10e79715843dc3b45f6d29c56083938f750ccfea1f9dcc550b0e0992
                                                                                          • Opcode Fuzzy Hash: 3298c2249680c0525d7f2c567fe4d93689637ddd8d27e5b0748b3221fa44b483
                                                                                          • Instruction Fuzzy Hash: 3D51C431B002099FDB44FBB4D848AAEB7B5FF88204B148A6AD5069F654EF74EC04C7A1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 924 691c120-691c12b 925 691c155-691c174 call 6918ba4 924->925 926 691c12d-691c154 924->926 931 691c176-691c179 925->931 932 691c17a-691c1d9 925->932 939 691c1db-691c1de 932->939 940 691c1df-691c26c GlobalMemoryStatusEx 932->940 943 691c275-691c29d 940->943 944 691c26e-691c274 940->944 944->943
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.542766037.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6910000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e239e4ed66121d81d002a66b0dd6af5b51d1aeeda1b7a6b7195d5eb41d799457
                                                                                          • Instruction ID: 78f04c26e00bf9fbe70778734d3856a0f867ea5d932e4de12df2722c865d26df
                                                                                          • Opcode Fuzzy Hash: e239e4ed66121d81d002a66b0dd6af5b51d1aeeda1b7a6b7195d5eb41d799457
                                                                                          • Instruction Fuzzy Hash: 2A415572E0435A8FCB10DFA5C8443AEBBF5AF89310F25856AD544A7250EB78A841CBE1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1481 319d70c-319d76f 1483 319d7a8-319d7f2 LoadLibraryA 1481->1483 1484 319d771-319d77b 1481->1484 1491 319d7fb-319d82c 1483->1491 1492 319d7f4-319d7fa 1483->1492 1484->1483 1485 319d77d-319d77f 1484->1485 1486 319d781-319d78b 1485->1486 1487 319d7a2-319d7a5 1485->1487 1489 319d78d 1486->1489 1490 319d78f-319d79e 1486->1490 1487->1483 1489->1490 1490->1490 1493 319d7a0 1490->1493 1496 319d83c 1491->1496 1497 319d82e-319d832 1491->1497 1492->1491 1493->1487 1499 319d83d 1496->1499 1497->1496 1498 319d834 1497->1498 1498->1496 1499->1499
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNELBASE(?), ref: 0319D7E2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.517584802.0000000003190000.00000040.00000800.00020000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_3190000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: a0793f7d8016bbf138d63d0a50538b1d6b5e618ece526877f5988a6216b53470
                                                                                          • Instruction ID: 7a75a2b9d20b71e5ae0b1089f7fbaa48a4ba4a5136736944156923ed4bd44837
                                                                                          • Opcode Fuzzy Hash: a0793f7d8016bbf138d63d0a50538b1d6b5e618ece526877f5988a6216b53470
                                                                                          • Instruction Fuzzy Hash: 783125B5D002498FEF18CFA9D8957AEFBF1FB08314F14852AE815AB290D7749446CF92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1462 319b7d4-319d76f 1464 319d7a8-319d7f2 LoadLibraryA 1462->1464 1465 319d771-319d77b 1462->1465 1472 319d7fb-319d82c 1464->1472 1473 319d7f4-319d7fa 1464->1473 1465->1464 1466 319d77d-319d77f 1465->1466 1467 319d781-319d78b 1466->1467 1468 319d7a2-319d7a5 1466->1468 1470 319d78d 1467->1470 1471 319d78f-319d79e 1467->1471 1468->1464 1470->1471 1471->1471 1474 319d7a0 1471->1474 1477 319d83c 1472->1477 1478 319d82e-319d832 1472->1478 1473->1472 1474->1468 1480 319d83d 1477->1480 1478->1477 1479 319d834 1478->1479 1479->1477 1480->1480
                                                                                          APIs
                                                                                          • LoadLibraryA.KERNELBASE(?), ref: 0319D7E2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.517584802.0000000003190000.00000040.00000800.00020000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_3190000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: b9f5a4e1717ec0dc9fb35ea1f5c960d52631deed95c94cd645c2dfcaf5a81944
                                                                                          • Instruction ID: 251b239550408016b0f00a9fb309f7ff424734057f4cce4bcbac86703c727e7a
                                                                                          • Opcode Fuzzy Hash: b9f5a4e1717ec0dc9fb35ea1f5c960d52631deed95c94cd645c2dfcaf5a81944
                                                                                          • Instruction Fuzzy Hash: 2C3134B0D042498FEF18CFA9D8957AEFBF1FB08314F14852AE815AB290D7749485CF92
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2119 6917c78-6917ce1 2121 6917ce3-6917ce6 2119->2121 2122 6917ce9-6917cf3 2119->2122 2121->2122 2123 6917cf5-6917cfd 2122->2123 2124 6917cff-6917d41 RegQueryValueExW 2122->2124 2123->2124 2125 6917d43-6917d49 2124->2125 2126 6917d4a-6917d84 2124->2126 2125->2126 2130 6917d86 2126->2130 2131 6917d8e 2126->2131 2130->2131
                                                                                          APIs
                                                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06917D31
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.542766037.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6910000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: QueryValue
                                                                                          • String ID:
                                                                                          • API String ID: 3660427363-0
                                                                                          • Opcode ID: 3fb1a40effc8e39606093eef05e6a300912311c64a9720e956b75bd0c187c79e
                                                                                          • Instruction ID: e045d9155dd098030227b0fde038d6a3d7d443ef9d6b15e8c9eb10ea930ad5e2
                                                                                          • Opcode Fuzzy Hash: 3fb1a40effc8e39606093eef05e6a300912311c64a9720e956b75bd0c187c79e
                                                                                          • Instruction Fuzzy Hash: 2531EEB5D002599FCB10CFEAC884A9EBFF5BF48310F24812AE819AB314C7749905CFA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2132 69179c0-6917a10 2133 6917a12-6917a15 2132->2133 2134 6917a18-6917a84 RegOpenKeyExW 2132->2134 2133->2134 2136 6917a86-6917a8c 2134->2136 2137 6917a8d-6917ac5 2134->2137 2136->2137 2141 6917ac7-6917ad0 2137->2141 2142 6917ad8 2137->2142 2141->2142 2143 6917ad9 2142->2143 2143->2143
                                                                                          APIs
                                                                                          • RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?), ref: 06917A74
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.542766037.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6910000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: Open
                                                                                          • String ID:
                                                                                          • API String ID: 71445658-0
                                                                                          • Opcode ID: 96e1cd21e48c4bf42f987324186a0e6cfa02c74cfb2952f7d95642613179d285
                                                                                          • Instruction ID: 03331f5e65313f6d04cb496d7caac5b442cadccffd9a9e4e19ec7797e8cb4c06
                                                                                          • Opcode Fuzzy Hash: 96e1cd21e48c4bf42f987324186a0e6cfa02c74cfb2952f7d95642613179d285
                                                                                          • Instruction Fuzzy Hash: D331F0B1D012499FDB00CF99C584B8EFFF5BF48314F29816AE409AB340C7B59985CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2144 31957df-31957e8 2145 31957ea-31957fe call 31953b0 2144->2145 2146 3195855-3195882 2144->2146 2163 3195808 call 31957df 2145->2163 2164 3195808 call 3195840 2145->2164 2165 3195808 call 3195832 2145->2165 2152 3195888 2146->2152 2153 3195884-3195886 2146->2153 2150 319580e-319582d call 3195600 2155 319588d-3195898 2152->2155 2153->2155 2157 31958f9-3195906 2155->2157 2158 319589a-31958cb RtlEncodePointer 2155->2158 2160 31958cd-31958d3 2158->2160 2161 31958d4-31958f4 2158->2161 2160->2161 2161->2157 2163->2150 2164->2150 2165->2150
                                                                                          APIs
                                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 031958BA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.517584802.0000000003190000.00000040.00000800.00020000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_3190000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID:
                                                                                          • API String ID: 2118026453-0
                                                                                          • Opcode ID: f06e28681e58c7fe8c17b7cc72731ee531e3d7dad15f54f9fe045dc11d55dfae
                                                                                          • Instruction ID: 0aa7671af0fbbfbbb91fe543f62d1353daa530294c997ac60ef250c83beec1e7
                                                                                          • Opcode Fuzzy Hash: f06e28681e58c7fe8c17b7cc72731ee531e3d7dad15f54f9fe045dc11d55dfae
                                                                                          • Instruction Fuzzy Hash: B221CA749003498FEB12DFA9E40A399BBF4EB0A304F1480ABD415A7240DB796509CFA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2166 3195832-3195882 2169 3195888 2166->2169 2170 3195884-3195886 2166->2170 2171 319588d-3195898 2169->2171 2170->2171 2172 31958f9-3195906 2171->2172 2173 319589a-31958cb RtlEncodePointer 2171->2173 2175 31958cd-31958d3 2173->2175 2176 31958d4-31958f4 2173->2176 2175->2176 2176->2172
                                                                                          APIs
                                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 031958BA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.517584802.0000000003190000.00000040.00000800.00020000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_3190000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID:
                                                                                          • API String ID: 2118026453-0
                                                                                          • Opcode ID: b60defda0b9c53d943a833b794ccc5ed2ab067aab5ac227e9d2ed6e633b1670b
                                                                                          • Instruction ID: f18a0b1c53f1ac96a1761c23e9c645ed04373a8c044060c5ee89b3418b89cf6d
                                                                                          • Opcode Fuzzy Hash: b60defda0b9c53d943a833b794ccc5ed2ab067aab5ac227e9d2ed6e633b1670b
                                                                                          • Instruction Fuzzy Hash: BB2174B5D013898FDB12DFA9D54939EBBF4EB09314F1888AAD404B3600CB386505CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2178 6918ba4-691c26c GlobalMemoryStatusEx 2181 691c275-691c29d 2178->2181 2182 691c26e-691c274 2178->2182 2182->2181
                                                                                          APIs
                                                                                          • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0691C172), ref: 0691C25F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.542766037.0000000006910000.00000040.00000800.00020000.00000000.sdmp, Offset: 06910000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_6910000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: GlobalMemoryStatus
                                                                                          • String ID:
                                                                                          • API String ID: 1890195054-0
                                                                                          • Opcode ID: 6341e7d3e0cbebdf9108ee7a6bfabfd9d05969c2616bea675cb58eed8b2d0fe5
                                                                                          • Instruction ID: d39d111c2aba84a3e5e06fc0a405e2fb6426f4d1faeba6a65d327df82993e8b6
                                                                                          • Opcode Fuzzy Hash: 6341e7d3e0cbebdf9108ee7a6bfabfd9d05969c2616bea675cb58eed8b2d0fe5
                                                                                          • Instruction Fuzzy Hash: A31133B1C046299BDB10CF9AC444BEEFBF4AB48320F15856AD814B7240D7B8A945CFE1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2185 3195840-3195882 2188 3195888 2185->2188 2189 3195884-3195886 2185->2189 2190 319588d-3195898 2188->2190 2189->2190 2191 31958f9-3195906 2190->2191 2192 319589a-31958cb RtlEncodePointer 2190->2192 2194 31958cd-31958d3 2192->2194 2195 31958d4-31958f4 2192->2195 2194->2195 2195->2191
                                                                                          APIs
                                                                                          • RtlEncodePointer.NTDLL(00000000), ref: 031958BA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.517584802.0000000003190000.00000040.00000800.00020000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_3190000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer
                                                                                          • String ID:
                                                                                          • API String ID: 2118026453-0
                                                                                          • Opcode ID: 7b53a9c250333d9f9928a144b94e2d0f11810d59ae85721bcea60c03956e7808
                                                                                          • Instruction ID: 465d629dd5949ba944da3749e2b3bb9d4cee64e83323d95a14894d3034c0fac5
                                                                                          • Opcode Fuzzy Hash: 7b53a9c250333d9f9928a144b94e2d0f11810d59ae85721bcea60c03956e7808
                                                                                          • Instruction Fuzzy Hash: C11183B0D003898FEF21DFAAD40879EBBF8EB49314F1484AAD404B3600CB38A545CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2197 3190a90-3190acb 2198 3190ad3-3190b0b VirtualAllocExNuma 2197->2198 2199 3190b0d-3190b13 2198->2199 2200 3190b14-3190b31 2198->2200 2199->2200
                                                                                          APIs
                                                                                          • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 03190AFE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.517584802.0000000003190000.00000040.00000800.00020000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_3190000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocNumaVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 4233825816-0
                                                                                          • Opcode ID: 6fc83ae6bd4c5d9f81422b24adf7674a8ce7eb7b8b6d2c16ed28b526bf8215ba
                                                                                          • Instruction ID: d7675077c7a1677975bc4afe2e999c4bc8273a2c7900929627b6d6938d59d084
                                                                                          • Opcode Fuzzy Hash: 6fc83ae6bd4c5d9f81422b24adf7674a8ce7eb7b8b6d2c16ed28b526bf8215ba
                                                                                          • Instruction Fuzzy Hash: 8811F0B59002499FDB10CF9AD884BDEBFF8FF88324F14841AE519A7210C775A954CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.509830545.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_137d000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 802e8e32222de71400391d09d3c0e7156f66fdb432e0aa04bd1f7030237712e4
                                                                                          • Instruction ID: 117d6956044df67685e00f51e7c5edf3cc00918a6ca97a7ba2c5255926ab1a64
                                                                                          • Opcode Fuzzy Hash: 802e8e32222de71400391d09d3c0e7156f66fdb432e0aa04bd1f7030237712e4
                                                                                          • Instruction Fuzzy Hash: 8862053244E7C18FCB278BB49C605953FB1AE1722471F02DBD884DF6A3D26D5A5AC722
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: k3<
                                                                                          • API String ID: 0-719725580
                                                                                          • Opcode ID: 83e82d623f8f5e86246a09cf7e2224d023d0280bcdd7ff8b58b4dc011582afa5
                                                                                          • Instruction ID: 78ef93a47ef778ffcb039e4bf8390eafaf6f0e2a4698137972a437f9df25068e
                                                                                          • Opcode Fuzzy Hash: 83e82d623f8f5e86246a09cf7e2224d023d0280bcdd7ff8b58b4dc011582afa5
                                                                                          • Instruction Fuzzy Hash: B8216071E0051A8FCB14DF68C8849BEBBB3FF84314F1581D9E615AB2A0CB34AC42CB94
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.517584802.0000000003190000.00000040.00000800.00020000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_3190000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: Sleep
                                                                                          • String ID:
                                                                                          • API String ID: 3472027048-0
                                                                                          • Opcode ID: 30ee8169a900dec0867f4e4db2e2d76826aa9616564ced6b301c71dc5a574fd7
                                                                                          • Instruction ID: 8cbb140a658ea1ec91f40f85774529a4009bb53eb4ce3f471a8f5f0d4a9e5fa4
                                                                                          • Opcode Fuzzy Hash: 30ee8169a900dec0867f4e4db2e2d76826aa9616564ced6b301c71dc5a574fd7
                                                                                          • Instruction Fuzzy Hash: 2911F2B48002498FDB20CF9AD484BDEBFF4AB88324F14846AD459A3200C7B56544CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.517584802.0000000003190000.00000040.00000800.00020000.00000000.sdmp, Offset: 03190000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_3190000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID: Sleep
                                                                                          • String ID:
                                                                                          • API String ID: 3472027048-0
                                                                                          • Opcode ID: 3a444e7154fa60f0eac6bb4606a95edf8b65c01da91497bedc09e428550611df
                                                                                          • Instruction ID: a65cc288f2da37a3624969920d4e732d8ba5ef0a6c338dca48d6f7e725fe22fa
                                                                                          • Opcode Fuzzy Hash: 3a444e7154fa60f0eac6bb4606a95edf8b65c01da91497bedc09e428550611df
                                                                                          • Instruction Fuzzy Hash: 1911F0B5800259CFDB20CF9AD484BDEFFF4EB88328F14846AD559A7250C7B5A944CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.509830545.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_137d000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 05aec91688ccd45f69418e005feee2ba2536446c340c94d21be1cdeaefdb8288
                                                                                          • Instruction ID: fca46eb7f8bf73ef7132f56495553a90476b06d0eaf14f4bc815e47cd65682c5
                                                                                          • Opcode Fuzzy Hash: 05aec91688ccd45f69418e005feee2ba2536446c340c94d21be1cdeaefdb8288
                                                                                          • Instruction Fuzzy Hash: 7642F23244E7C18FCB278B749C605963FB0AE1722471F02DBD884DF6A3D26D5A5AC762
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 35e0a6f8eef128c7e9dfb2b0a9c314a7b7be81d6e90a751678bc3ef3b51bb06e
                                                                                          • Instruction ID: 0b7683aa2cc522fac14b0c046c8a3fbbb8274720b5d3dcdf817e90187c28540f
                                                                                          • Opcode Fuzzy Hash: 35e0a6f8eef128c7e9dfb2b0a9c314a7b7be81d6e90a751678bc3ef3b51bb06e
                                                                                          • Instruction Fuzzy Hash: 7E515831314111CFDB15DF39D888A6ABBEAFF8865071A85E9E416CF3A1DB30EC118B64
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 993ac0099d426297c9c948b1dca9359c703ae4567667aa91489a7c47ec586226
                                                                                          • Instruction ID: 67b9b41e84e312d450e31d9a2f8e18dfaf477faf1d873403bbbc40b11a52793a
                                                                                          • Opcode Fuzzy Hash: 993ac0099d426297c9c948b1dca9359c703ae4567667aa91489a7c47ec586226
                                                                                          • Instruction Fuzzy Hash: CC31E0367041049FCB18AB74D8546AEBBE7EFCD215F1580A9D50ADB394DF70EC0287A1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 7b1f467ed0589774ff66640f31447393e7663520e9a53e676054cda7f8a46bf8
                                                                                          • Instruction ID: 122097a33b5d4dc43948e2ab042a083840dcba67a5372dbfb69449ee4cd71435
                                                                                          • Opcode Fuzzy Hash: 7b1f467ed0589774ff66640f31447393e7663520e9a53e676054cda7f8a46bf8
                                                                                          • Instruction Fuzzy Hash: 0231AD313046459FCB19EF29E858A7E3BA7FB89210B0480E9F906CB295CB34EC028765
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: afbffc32783cbfec42def55726721a69b4dee266ba01a18c404602401cd07657
                                                                                          • Instruction ID: 72b8328231e847a7b07c471f8e3728ece6c066286f89316eb21359ec33be197a
                                                                                          • Opcode Fuzzy Hash: afbffc32783cbfec42def55726721a69b4dee266ba01a18c404602401cd07657
                                                                                          • Instruction Fuzzy Hash: D231D5303086569FCB25DA64D894A7D7FA7FBC1640B1944EEE017CB2A1CB24EC80C796
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0cbc8350f29b4be29a0e954a5800da59c68a3ffae0fb5279c7e1c37688993a50
                                                                                          • Instruction ID: 1fdf2da6e440f2643101e0ec2e5ad63fb6f0bbadc6934d796f7707084081794f
                                                                                          • Opcode Fuzzy Hash: 0cbc8350f29b4be29a0e954a5800da59c68a3ffae0fb5279c7e1c37688993a50
                                                                                          • Instruction Fuzzy Hash: 9D21AE303142168BEB1756359458A3E7A8FFFC4608F1440FCD602CB7A5DF69F881975A
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: cc7bdc92fabb26ab44e77c25270848ac8ec2397ef941f132d33acf67c0c60796
                                                                                          • Instruction ID: 0cbcc6e7503cd137c7d29d105d484399240eecf04f9fa12ba92c0b627efcfcf7
                                                                                          • Opcode Fuzzy Hash: cc7bdc92fabb26ab44e77c25270848ac8ec2397ef941f132d33acf67c0c60796
                                                                                          • Instruction Fuzzy Hash: C2216031318255CBD716CEAA9884B6BBFEEEB99210B4445EDF857CF240DB74EC408B64
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 6805fda4102dac990fcdd6525ab3f6909d4e9a37d753ea07643b6f0ea8f6cb94
                                                                                          • Instruction ID: 68d218a39ef8980bcff53b329bcd5460bc6c121a7e7ee19e062eacd9199af395
                                                                                          • Opcode Fuzzy Hash: 6805fda4102dac990fcdd6525ab3f6909d4e9a37d753ea07643b6f0ea8f6cb94
                                                                                          • Instruction Fuzzy Hash: F821CF313006168BEB1757759889B3E6A8FFFC4508B0440FCD602CB7A5DB68F841975A
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.509357950.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_136d000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8fe71af0c69f800eb71519243cf28d878e616597ed8297e7bb54db318f938f62
                                                                                          • Instruction ID: 3f81b492ce5824fc86fe55649574b5948616fb29eb21c9634bae3e2577e6a00c
                                                                                          • Opcode Fuzzy Hash: 8fe71af0c69f800eb71519243cf28d878e616597ed8297e7bb54db318f938f62
                                                                                          • Instruction Fuzzy Hash: 5A213AB1604244DFDB05CF94D9C0F26BF69FB8832CF24C569DA454B61AC336D856CBA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.509830545.000000000137D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0137D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_137d000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0fefa4dd317c72038cc09d6eb5439d87f2485fdd8bd3af6c0b65528f50b34e37
                                                                                          • Instruction ID: e4eb21687acb454852bcdd779d21a22659a5317e6b09f8d31b35ba57c19afefe
                                                                                          • Opcode Fuzzy Hash: 0fefa4dd317c72038cc09d6eb5439d87f2485fdd8bd3af6c0b65528f50b34e37
                                                                                          • Instruction Fuzzy Hash: B321F575608204DFDB25CF24D8C4B26BB65FB84318F24C9BDD9495B346C33ED846CA61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: d4d8d7e02cd93f4b59acc8bae3f780ddd852cae5aad596f532c7723d2fa6e4f3
                                                                                          • Instruction ID: 2beda3f0b8965c33482b018c4ce293d6396e19786d53f1d2c6a00461ba58efd7
                                                                                          • Opcode Fuzzy Hash: d4d8d7e02cd93f4b59acc8bae3f780ddd852cae5aad596f532c7723d2fa6e4f3
                                                                                          • Instruction Fuzzy Hash: 90110D75E0021A9FCB10EF99D844ABFFBBAFB88210F10446AE915E3241D7749A55CBE1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.509357950.000000000136D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0136D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_136d000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 8d778767f53fd0a6c663cb8d613203c36db215e48ccc3c7032546bce1bc62798
                                                                                          • Instruction ID: 8913ae5276e7dbd712d6f385c72be0e0bffb28c6e4b4a8bb28a880ffbe0126e4
                                                                                          • Opcode Fuzzy Hash: 8d778767f53fd0a6c663cb8d613203c36db215e48ccc3c7032546bce1bc62798
                                                                                          • Instruction Fuzzy Hash: 9D11D376504280CFCB12CF54D5C4B16BF71FB88328F28C6A9D9454B65BC33AD456CBA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3400c572d38434bea3e06d0354e03c4821c08de350dd864ca7e30b932cbd8f30
                                                                                          • Instruction ID: f3f9694358a7563fd101dd4a17cd1e8d485c338f31bcc22f5d03c426df05276e
                                                                                          • Opcode Fuzzy Hash: 3400c572d38434bea3e06d0354e03c4821c08de350dd864ca7e30b932cbd8f30
                                                                                          • Instruction Fuzzy Hash: 0D1130B1E0021A9FCB10EFA9D8449FFBBB6FB88310F10456AE515E3244D7749A51CBA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c955e161e7a0842e264082e53b934f136178982bd78b93949a4dc91e993d9099
                                                                                          • Instruction ID: 252ff04484899ca56f9b300612258f011722a0690db0c7e13dc04ca92417f13d
                                                                                          • Opcode Fuzzy Hash: c955e161e7a0842e264082e53b934f136178982bd78b93949a4dc91e993d9099
                                                                                          • Instruction Fuzzy Hash: 17F09C313445118B97165A2E9455A2A7BDFFFC4A5131500FDE506C7371DEA5EC0187E8
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1307799f09838fb8bd4d8ae2cb31b5db2edec47c95baa7a4d34b84d70460d5df
                                                                                          • Instruction ID: 51c6e0a20641f98ca5f9a719404257d7bd089123d824e0752121d9dfd1f39fae
                                                                                          • Opcode Fuzzy Hash: 1307799f09838fb8bd4d8ae2cb31b5db2edec47c95baa7a4d34b84d70460d5df
                                                                                          • Instruction Fuzzy Hash: 5AE0C23A34D2098FDB0CAA65A98DB74BF37FB9016171801FFE507CD192E725A044CB64
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e9f87b4cd5eddd0b26445881850fcc93d0bfdb08135e439bd3cc9cc0d07b937b
                                                                                          • Instruction ID: 1572e9e609f900ef138f5871bf88bf8025fe12640bce00e79801fa84cf22477b
                                                                                          • Opcode Fuzzy Hash: e9f87b4cd5eddd0b26445881850fcc93d0bfdb08135e439bd3cc9cc0d07b937b
                                                                                          • Instruction Fuzzy Hash: 5CE0263B20C1442BD722409E7C416F53F1DD2C22B470501EBF51CDB140D042A85683B9
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 00000001.00000002.540230715.0000000005BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BC0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_1_2_5bc0000_payment copy.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fdfacfbc96f9883a775be626ed3395e90db08a7730a3e71e5477131051a04b74
                                                                                          • Instruction ID: fd730626ad64dff0c33cacffbc75e9fe76590692a7da87601d9baa5e768e6ef9
                                                                                          • Opcode Fuzzy Hash: fdfacfbc96f9883a775be626ed3395e90db08a7730a3e71e5477131051a04b74
                                                                                          • Instruction Fuzzy Hash: 09D05E7360C5143BE721408EAC41BB76A4ED3C13B5E1641EBF40C931809482AC8041A9
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Execution Graph

                                                                                          Execution Coverage:10.7%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:0%
                                                                                          Total number of Nodes:119
                                                                                          Total number of Limit Nodes:9
                                                                                          execution_graph 15106 74882e8 15107 7488473 15106->15107 15108 748830e 15106->15108 15108->15107 15110 7488568 PostMessageW 15108->15110 15111 74885d4 15110->15111 15111->15108 15112 14240d0 15113 14240e2 15112->15113 15114 14240ee 15113->15114 15118 14241e0 15113->15118 15123 1423c64 15114->15123 15116 142410d 15119 1424205 15118->15119 15127 14242e0 15119->15127 15131 14242d1 15119->15131 15124 1423c6f 15123->15124 15139 14251a4 15124->15139 15126 1426a50 15126->15116 15129 1424307 15127->15129 15128 14243e4 15129->15128 15135 1423de4 15129->15135 15132 1424307 15131->15132 15133 14243e4 15132->15133 15134 1423de4 CreateActCtxA 15132->15134 15134->15133 15136 1425370 CreateActCtxA 15135->15136 15138 1425433 15136->15138 15140 14251af 15139->15140 15143 14257f8 15140->15143 15142 1426af5 15142->15126 15144 1425803 15143->15144 15147 1425828 15144->15147 15146 1426bda 15146->15142 15148 1425833 15147->15148 15151 1425858 15148->15151 15150 1426cca 15150->15146 15153 1425863 15151->15153 15152 142741c 15152->15150 15153->15152 15156 142b300 15153->15156 15161 142b2f0 15153->15161 15157 142b321 15156->15157 15158 142b345 15157->15158 15166 142b5b8 15157->15166 15170 142b5a9 15157->15170 15158->15152 15162 142b321 15161->15162 15163 142b345 15162->15163 15164 142b5b8 3 API calls 15162->15164 15165 142b5a9 3 API calls 15162->15165 15163->15152 15164->15163 15165->15163 15168 142b5c5 15166->15168 15167 142b5ff 15167->15158 15168->15167 15175 14297b8 15168->15175 15171 142b525 15170->15171 15172 142b5b2 15170->15172 15173 142b5ff 15172->15173 15174 14297b8 3 API calls 15172->15174 15173->15158 15174->15173 15176 14297c3 15175->15176 15178 142c2f8 15176->15178 15179 1429880 15176->15179 15178->15178 15180 142988b 15179->15180 15181 1425858 3 API calls 15180->15181 15182 142c367 15180->15182 15181->15182 15186 142e0d8 15182->15186 15194 142e0e8 15182->15194 15183 142c3a0 15183->15178 15187 142e0e8 15186->15187 15189 142e125 15187->15189 15192 142e558 LoadLibraryExW 15187->15192 15193 142e568 LoadLibraryExW 15187->15193 15188 142e165 15190 142ef30 CreateWindowExW CreateWindowExW 15188->15190 15191 142ef1f CreateWindowExW CreateWindowExW 15188->15191 15189->15183 15190->15189 15191->15189 15192->15188 15193->15188 15196 142e119 15194->15196 15197 142e20a 15194->15197 15195 142e125 15195->15183 15196->15195 15201 142e558 LoadLibraryExW 15196->15201 15202 142e568 LoadLibraryExW 15196->15202 15197->15183 15198 142e165 15199 142ef30 CreateWindowExW CreateWindowExW 15198->15199 15200 142ef1f CreateWindowExW CreateWindowExW 15198->15200 15199->15197 15200->15197 15201->15198 15202->15198 15203 14291d0 15204 14291df 15203->15204 15207 14292c8 15203->15207 15212 14292b8 15203->15212 15208 14292db 15207->15208 15209 14292eb 15208->15209 15217 1429948 15208->15217 15221 1429958 15208->15221 15209->15204 15213 14292db 15212->15213 15214 14292eb 15213->15214 15215 1429948 LoadLibraryExW 15213->15215 15216 1429958 LoadLibraryExW 15213->15216 15214->15204 15215->15214 15216->15214 15218 142996c 15217->15218 15220 1429991 15218->15220 15225 14294b8 15218->15225 15220->15209 15222 142996c 15221->15222 15223 1429991 15222->15223 15224 14294b8 LoadLibraryExW 15222->15224 15223->15209 15224->15223 15226 1429b38 LoadLibraryExW 15225->15226 15228 1429bb1 15226->15228 15228->15220 15229 142b6d0 15230 142b736 15229->15230 15234 142b880 15230->15234 15237 142b890 15230->15237 15231 142b7e5 15240 1429840 15234->15240 15238 1429840 DuplicateHandle 15237->15238 15239 142b8be 15237->15239 15238->15239 15239->15231 15241 142b8f8 DuplicateHandle 15240->15241 15242 142b8be 15241->15242 15242->15231 15243 14298b0 15244 14298f2 15243->15244 15245 14298f8 GetModuleHandleW 15243->15245 15244->15245 15246 1429925 15245->15246 15247 7488d70 15248 7488d98 15247->15248 15249 7488d8e 15247->15249 15251 7488dd8 15249->15251 15252 7488de6 15251->15252 15254 7488e05 15251->15254 15256 7488f50 FindCloseChangeNotification 15252->15256 15254->15248 15257 7488e01 15256->15257 15257->15248

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 142fcd8-142fcec 1 142fd26-142fd9e 0->1 2 142fcee-142fd18 call 142de0c 0->2 5 142fda0-142fda6 1->5 6 142fda9-142fdb0 1->6 7 142fd1d-142fd1e 2->7 5->6 8 142fdb2-142fdb8 6->8 9 142fdbb-142fe5a CreateWindowExW 6->9 8->9 11 142fe63-142fe9b 9->11 12 142fe5c-142fe62 9->12 16 142fea8 11->16 17 142fe9d-142fea0 11->17 12->11 18 142fea9 16->18 17->16 18->18
                                                                                          APIs
                                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0142FE4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307284423.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_1420000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateWindow
                                                                                          • String ID:
                                                                                          • API String ID: 716092398-0
                                                                                          • Opcode ID: 5991b1b3c63275f15a978e50c9f53205c80c9fcd182459131274ef05589dc96f
                                                                                          • Instruction ID: 40a2f0eb7334d2334562e91c8947c995498848b1882116ea24b4cbf796fb0057
                                                                                          • Opcode Fuzzy Hash: 5991b1b3c63275f15a978e50c9f53205c80c9fcd182459131274ef05589dc96f
                                                                                          • Instruction Fuzzy Hash: A25101B1C00249AFDF11CFA9C884ACEBFB1BF48314F54816AE918AB221D7359895CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 19 142de0c-142fd9e 21 142fda0-142fda6 19->21 22 142fda9-142fdb0 19->22 21->22 23 142fdb2-142fdb8 22->23 24 142fdbb-142fe5a CreateWindowExW 22->24 23->24 26 142fe63-142fe9b 24->26 27 142fe5c-142fe62 24->27 31 142fea8 26->31 32 142fe9d-142fea0 26->32 27->26 33 142fea9 31->33 32->31 33->33
                                                                                          APIs
                                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0142FE4A
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307284423.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_1420000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateWindow
                                                                                          • String ID:
                                                                                          • API String ID: 716092398-0
                                                                                          • Opcode ID: c572b2fd621f37fc555ca09f9b8e52a03409a44221a452173d76f25849b965bd
                                                                                          • Instruction ID: 60c25f04b5ee9f8611c256115dcc565756a1283bf7494a48ca1efff399c36a0d
                                                                                          • Opcode Fuzzy Hash: c572b2fd621f37fc555ca09f9b8e52a03409a44221a452173d76f25849b965bd
                                                                                          • Instruction Fuzzy Hash: 1C51B0B1D103199FDB14CF9AC884ADEBFB5BF48314F64852AE819AB210D7749885CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 51 1425364-142536b 52 1425370-1425431 CreateActCtxA 51->52 54 1425433-1425439 52->54 55 142543a-1425494 52->55 54->55 62 14254a3-14254a7 55->62 63 1425496-1425499 55->63 64 14254b8 62->64 65 14254a9-14254b5 62->65 63->62 67 14254b9 64->67 65->64 67->67
                                                                                          APIs
                                                                                          • CreateActCtxA.KERNEL32(?), ref: 01425421
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307284423.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_1420000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create
                                                                                          • String ID:
                                                                                          • API String ID: 2289755597-0
                                                                                          • Opcode ID: ee07bc5aba8f63c138666e02596a7cac44bb43d91b1f186fdc8c5fa05e829d12
                                                                                          • Instruction ID: 564dab6682e83682fba9c65f2238987f73febb5466212052ab56c187766fddbc
                                                                                          • Opcode Fuzzy Hash: ee07bc5aba8f63c138666e02596a7cac44bb43d91b1f186fdc8c5fa05e829d12
                                                                                          • Instruction Fuzzy Hash: ED41D471D00229CBDB24DFA9C844BCEFBB5BF59309F60806AD418AB251DBB56946CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 34 1423de4-1425431 CreateActCtxA 37 1425433-1425439 34->37 38 142543a-1425494 34->38 37->38 45 14254a3-14254a7 38->45 46 1425496-1425499 38->46 47 14254b8 45->47 48 14254a9-14254b5 45->48 46->45 50 14254b9 47->50 48->47 50->50
                                                                                          APIs
                                                                                          • CreateActCtxA.KERNEL32(?), ref: 01425421
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307284423.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_1420000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create
                                                                                          • String ID:
                                                                                          • API String ID: 2289755597-0
                                                                                          • Opcode ID: 6086c64f2c645f76bc4edb424edbe8361a76a59f82e618b6c260340e4a098d14
                                                                                          • Instruction ID: 229651420e80d0c81999d03d39d201f96c30a02b598d64851909e3ab06fdc7a4
                                                                                          • Opcode Fuzzy Hash: 6086c64f2c645f76bc4edb424edbe8361a76a59f82e618b6c260340e4a098d14
                                                                                          • Instruction Fuzzy Hash: CE41F570D04228CBDB24DFA9C8447DEFBB1BF48308F50806AD418AB251D7B56946CF90
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 68 1429840-142b98c DuplicateHandle 70 142b995-142b9b2 68->70 71 142b98e-142b994 68->71 71->70
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0142B8BE,?,?,?,?,?), ref: 0142B97F
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307284423.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_1420000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 45e7089037011775610cb434959f9914acfaf0f150ccfe9938e01f700950083f
                                                                                          • Instruction ID: 92c6ab36b6cd812bcd5e30fe6f60a9c2fe17a5b79da17aadefa7a14c887adec9
                                                                                          • Opcode Fuzzy Hash: 45e7089037011775610cb434959f9914acfaf0f150ccfe9938e01f700950083f
                                                                                          • Instruction Fuzzy Hash: 1A21E3B5900219AFDB10CF9AD484ADEBBF8EB48324F54841AE958A7310D774A954CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 74 142b8f2-142b98c DuplicateHandle 75 142b995-142b9b2 74->75 76 142b98e-142b994 74->76 76->75
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0142B8BE,?,?,?,?,?), ref: 0142B97F
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307284423.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_1420000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 6a7caf6aead93f34557fb3690bd82a43c6b7a40c40ac379f16486689967fee96
                                                                                          • Instruction ID: d0bd9b8c61e13c3bae13a4a85bbed7e5cbfc035600342f3c98a1ea4cb929668b
                                                                                          • Opcode Fuzzy Hash: 6a7caf6aead93f34557fb3690bd82a43c6b7a40c40ac379f16486689967fee96
                                                                                          • Instruction Fuzzy Hash: BD21E2B5D002189FDB10CFA9D584BDEBBF4EB48324F14841AE954A3310D378A944CFA0
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 79 14294b8-1429b78 81 1429b80-1429baf LoadLibraryExW 79->81 82 1429b7a-1429b7d 79->82 83 1429bb1-1429bb7 81->83 84 1429bb8-1429bd5 81->84 82->81 83->84
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01429991,00000800,00000000,00000000), ref: 01429BA2
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307284423.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_1420000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: c3479a2fed79dc5526ee17cdc6e087594b3a2c91e97c16896fd7ebab5f823bca
                                                                                          • Instruction ID: 31e165c02b9353842252eaef8e799e406bb477e7d0d971cc80d7aa1a06587b66
                                                                                          • Opcode Fuzzy Hash: c3479a2fed79dc5526ee17cdc6e087594b3a2c91e97c16896fd7ebab5f823bca
                                                                                          • Instruction Fuzzy Hash: DB1133B69002188FDB10CF9AD444BDEFBF4BB88324F44842AD919A7200C374A945CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 87 1429b30-1429b78 88 1429b80-1429baf LoadLibraryExW 87->88 89 1429b7a-1429b7d 87->89 90 1429bb1-1429bb7 88->90 91 1429bb8-1429bd5 88->91 89->88 90->91
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01429991,00000800,00000000,00000000), ref: 01429BA2
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307284423.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_1420000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad
                                                                                          • String ID:
                                                                                          • API String ID: 1029625771-0
                                                                                          • Opcode ID: b128a3d568f9992102ec28d914acd13f6c401ec160dadc4e7da0e031464df8a9
                                                                                          • Instruction ID: 2c476be2a3cfb31aa6ea5bf2b52ad60684dd848ab89e527ce5e88591e24f9ec2
                                                                                          • Opcode Fuzzy Hash: b128a3d568f9992102ec28d914acd13f6c401ec160dadc4e7da0e031464df8a9
                                                                                          • Instruction Fuzzy Hash: 0E1112B6D002198FDB10CF9AC544BDEBBF4BF88324F55842AD919A7600C778A585CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 106 7488f50-7488fb5 FindCloseChangeNotification 107 7488fbe-7488fe6 106->107 108 7488fb7-7488fbd 106->108 108->107
                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 07488FA8
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.321552638.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_7480000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseFindNotification
                                                                                          • String ID:
                                                                                          • API String ID: 2591292051-0
                                                                                          • Opcode ID: 79c8c9994f11ac9d551bbe993999629efb80c4b9fec195ccd2326bb88db380e3
                                                                                          • Instruction ID: 96450d463105035b5aba152ff4c7f011cc5fd14c73ee2fa771aeea30ab76e31c
                                                                                          • Opcode Fuzzy Hash: 79c8c9994f11ac9d551bbe993999629efb80c4b9fec195ccd2326bb88db380e3
                                                                                          • Instruction Fuzzy Hash: 841145B1800209CFDB10DF9AC548BDEBBF8EF88324F14842AD968A7340C738A544CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 94 14298a8-14298f0 95 14298f2-14298f5 94->95 96 14298f8-1429923 GetModuleHandleW 94->96 95->96 97 1429925-142992b 96->97 98 142992c-1429940 96->98 97->98
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 01429916
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307284423.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_1420000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: 0fd0886b2e225caec04cc681a50f0273e2c729c9fc40ee45ed352f668f10e5cb
                                                                                          • Instruction ID: 4760fa19380f5bc4d74ec7fb386793a77c7edc7da68df735fdd4bcc97c9c5a8f
                                                                                          • Opcode Fuzzy Hash: 0fd0886b2e225caec04cc681a50f0273e2c729c9fc40ee45ed352f668f10e5cb
                                                                                          • Instruction Fuzzy Hash: 1F11FDB6D002598BDB10CF9AC548BDEBBF5AF48328F54842AC469B7710D378A585CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 100 14298b0-14298f0 101 14298f2-14298f5 100->101 102 14298f8-1429923 GetModuleHandleW 100->102 101->102 103 1429925-142992b 102->103 104 142992c-1429940 102->104 103->104
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 01429916
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307284423.0000000001420000.00000040.00000800.00020000.00000000.sdmp, Offset: 01420000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_1420000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: 51a1ee4794405f67dfcf7aa4cfa6273a2a375fcdfa79e90ba8165e22da08119a
                                                                                          • Instruction ID: 7bac44b00dedcde2b319bf5f623a211bc332b32d47ed38b50494628fe6f3fda9
                                                                                          • Opcode Fuzzy Hash: 51a1ee4794405f67dfcf7aa4cfa6273a2a375fcdfa79e90ba8165e22da08119a
                                                                                          • Instruction Fuzzy Hash: 7C110FB5D002598FDB10CF9AC448BDEFBF4EB88224F54842AD869A7710C378A545CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 111 7488568-74885d2 PostMessageW 112 74885db-74885ef 111->112 113 74885d4-74885da 111->113 113->112
                                                                                          APIs
                                                                                          • PostMessageW.USER32(?,?,?,?), ref: 074885C5
                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.321552638.0000000007480000.00000040.00000800.00020000.00000000.sdmp, Offset: 07480000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_7480000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessagePost
                                                                                          • String ID:
                                                                                          • API String ID: 410705778-0
                                                                                          • Opcode ID: ffced67f908c227f4230b7fcbd98073552dc6617624fe1ea3ecd026f7aa8d5f7
                                                                                          • Instruction ID: aafb3e541fe53d99f2c3b30bc6a34804e16ca728de587abe987fe8ed61524342
                                                                                          • Opcode Fuzzy Hash: ffced67f908c227f4230b7fcbd98073552dc6617624fe1ea3ecd026f7aa8d5f7
                                                                                          • Instruction Fuzzy Hash: 4211D0B58002499FDB10DF9AC889BDFBFF8EB58324F14881AE954A7600C374A944CFA1
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307128522.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_139d000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 80328cf5ace258dc835b297607d2a98afa79627fbeda5baeeec28f2d280c6b4a
                                                                                          • Instruction ID: 9094e8610e325719377f9e0457165d15f0cd496bcd723c0ae594d302aa4e3b2e
                                                                                          • Opcode Fuzzy Hash: 80328cf5ace258dc835b297607d2a98afa79627fbeda5baeeec28f2d280c6b4a
                                                                                          • Instruction Fuzzy Hash: 852134B1608204DFDF15CFA4D8C5B26BB65FB84358F24C6A9D94A4B346C33AD807CA61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307128522.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_139d000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: bad1385ad2daba4563a37f3253dae980b99279ae4083f155043e3f36acfeabec
                                                                                          • Instruction ID: 86d5b51af8857bb6ebb05a9ed89b20d9d4c00ba09c76f37e39f09d1c8fb34172
                                                                                          • Opcode Fuzzy Hash: bad1385ad2daba4563a37f3253dae980b99279ae4083f155043e3f36acfeabec
                                                                                          • Instruction Fuzzy Hash: 502137B1504204DFDF05CF94D5C1B26BB65FB84328F24C6ADD9894B246C33AD806CA61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307128522.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_139d000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 06a7eb2830fe3889e456d27655020f58fd7942a7660a67a9db2bbc7502f19bed
                                                                                          • Instruction ID: 0b0a7c4e043aa20db90bc4e92d8a18db8ac447511f7734e79f4fc0411fc9f0d8
                                                                                          • Opcode Fuzzy Hash: 06a7eb2830fe3889e456d27655020f58fd7942a7660a67a9db2bbc7502f19bed
                                                                                          • Instruction Fuzzy Hash: 54118B75904280DFDF12CF54D5C4B15BBB1FB84228F28C6AAD8894B696C33AD44ACB61
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%

                                                                                          Memory Dump Source
                                                                                          • Source File: 0000000B.00000002.307128522.000000000139D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0139D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_11_2_139d000_WdFVsOe.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 06a7eb2830fe3889e456d27655020f58fd7942a7660a67a9db2bbc7502f19bed
                                                                                          • Instruction ID: afd366eb45ce86f2555d85cac1b2fdbfeeeda0022db42e46d0433cea44c649ad
                                                                                          • Opcode Fuzzy Hash: 06a7eb2830fe3889e456d27655020f58fd7942a7660a67a9db2bbc7502f19bed
                                                                                          • Instruction Fuzzy Hash: B1118B75504280DFDB12CF58D5D4B15BBA1FB84328F28C6AAD8494B756C33AD44ACBA2
                                                                                          Uniqueness

                                                                                          Uniqueness Score: -1.00%