Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
payment copy.exe

Overview

General Information

Sample Name:payment copy.exe
Analysis ID:756033
MD5:52fcd3f3cb7f0eaacc6cc393ba9313da
SHA1:5a7304f89ce6525e0449ffdf0022f5114d181680
SHA256:eeabb0a04ea59624d05185afbbf4a1c8e5db554c0c325871c4c0ac5de34c5547
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • payment copy.exe (PID: 6064 cmdline: C:\Users\user\Desktop\payment copy.exe MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
    • payment copy.exe (PID: 1848 cmdline: C:\Users\user\Desktop\payment copy.exe MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
  • WdFVsOe.exe (PID: 5864 cmdline: "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe" MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
    • WdFVsOe.exe (PID: 5304 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
  • WdFVsOe.exe (PID: 4640 cmdline: "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe" MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
    • WdFVsOe.exe (PID: 612 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
    • WdFVsOe.exe (PID: 2728 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 52FCD3F3CB7F0EAACC6CC393BA9313DA)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "host39.registrar-servers.com", "Username": "Emenike@potashin.us", "Password": "})cZs aj5Xr;   C"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.310942786.000000000325E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 22 entries
            SourceRuleDescriptionAuthorStrings
            0.2.payment copy.exe.474a140.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.payment copy.exe.474a140.7.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.payment copy.exe.474a140.7.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x32c0b:$s10: logins
                • 0x32685:$s11: credential
                • 0x2e8d5:$g1: get_Clipboard
                • 0x2e8e3:$g2: get_Keyboard
                • 0x2e8f0:$g3: get_Password
                • 0x2fca0:$g4: get_CtrlKeyDown
                • 0x2fcb0:$g5: get_ShiftKeyDown
                • 0x2fcc1:$g6: get_AltKeyDown
                0.2.payment copy.exe.474a140.7.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
                • 0x300b6:$a13: get_DnsResolver
                • 0x2e7c3:$a20: get_LastAccessed
                • 0x30ae4:$a27: set_InternalServerPort
                • 0x30e19:$a30: set_GuidMasterKey
                • 0x2e8d5:$a33: get_Clipboard
                • 0x2e8e3:$a34: get_Keyboard
                • 0x2fcb0:$a35: get_ShiftKeyDown
                • 0x2fcc1:$a36: get_AltKeyDown
                • 0x2e8f0:$a37: get_Password
                • 0x2f40b:$a38: get_PasswordHash
                • 0x30518:$a39: get_DefaultCredentials
                1.0.payment copy.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 25 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: payment copy.exeReversingLabs: Detection: 30%
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeReversingLabs: Detection: 30%
                  Source: payment copy.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJoe Sandbox ML: detected
                  Source: 1.0.payment copy.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 0.2.payment copy.exe.474a140.7.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "host39.registrar-servers.com", "Username": "Emenike@potashin.us", "Password": "})cZs aj5Xr; C"}
                  Source: payment copy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: payment copy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Joe Sandbox ViewIP Address: 68.65.122.214 68.65.122.214
                  Source: global trafficTCP traffic: 192.168.2.3:49699 -> 68.65.122.214:587
                  Source: global trafficTCP traffic: 192.168.2.3:49699 -> 68.65.122.214:587
                  Source: payment copy.exe, 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: payment copy.exe, 00000001.00000002.541820691.000000000674E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.542427252.0000000006E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: payment copy.exe, 00000001.00000002.541820691.000000000674E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.micros
                  Source: WdFVsOe.exe, 0000000F.00000003.392037383.0000000006E4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://host39.registrar-servers.com
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com09
                  Source: WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://vpDUpe.com
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: payment copy.exe, 00000000.00000003.249126135.00000000062E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ascendercorp.com/typedesigners.html
                  Source: payment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                  Source: payment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comig
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: payment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comypo
                  Source: payment copy.exe, 00000000.00000003.250990543.000000000631E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.co
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: payment copy.exe, 00000000.00000003.250921715.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250791703.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250690710.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250751911.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250850742.000000000631E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: payment copy.exe, 00000000.00000003.251240828.00000000062E8000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250252956.00000000062E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8&
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: payment copy.exe, 00000000.00000003.250252956.00000000062E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersdF-
                  Source: payment copy.exe, 00000000.00000003.251240828.00000000062E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers~
                  Source: payment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comB.TTF
                  Source: payment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comldwatR8
                  Source: payment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247640305.00000000062FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: payment copy.exe, 00000000.00000003.247675536.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247640305.00000000062FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: payment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cndf
                  Source: payment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247497084.00000000062FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnht
                  Source: payment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247497084.00000000062FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnn
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: payment copy.exe, 00000000.00000003.250243768.00000000062DD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250205326.00000000062DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.95n
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: payment copy.exe, 00000000.00000003.246833567.00000000062E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.net
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: payment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn0
                  Source: payment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cno.m
                  Source: payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wINwvqrEjRpr.net
                  Source: WdFVsOe.exe, 0000000C.00000002.532509205.000000000357A000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wINwvqrEjRpr.net8
                  Source: payment copy.exe, 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                  Source: unknownDNS traffic detected: queries for: host39.registrar-servers.com

                  System Summary

                  barindex
                  Source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.payment copy.exe.34005e8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 11.2.WdFVsOe.exe.2f9063c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 11.2.WdFVsOe.exe.2f72e6c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.payment copy.exe.33e2e18.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: payment copy.exe PID: 6064, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: payment copy.exe PID: 1848, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: initial sampleStatic PE information: Filename: payment copy.exe
                  Source: 1.0.payment copy.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bB9A5F9D9u002d8564u002d4959u002dB9E5u002d6870FE15AC73u007d/u0033C0419E1u002d8030u002d4D25u002dB25Eu002d1005A86CEC6B.csLarge array initialization: .cctor: array initializer size 10947
                  Source: payment copy.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.payment copy.exe.34005e8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 11.2.WdFVsOe.exe.2f9063c.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 11.2.WdFVsOe.exe.2f72e6c.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.payment copy.exe.33e2e18.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: payment copy.exe PID: 6064, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: payment copy.exe PID: 1848, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_018AFBEA
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_018AC164
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_018AE5A2
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_018AE5B0
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_07FA0040
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_07FA0006
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0319FAA0
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BCC5AA
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BC29F8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BC0910
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BC0040
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BCD318
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684076B
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684A598
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068452E8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684C2F0
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06847F88
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06842F78
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06845CB8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068467A9
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684C240
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068420D0
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684D0D3
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06846FB8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06846DC8
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06914A60
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_069115CD
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_069153C8
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 11_2_0142C164
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 11_2_0142E5A2
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 11_2_0142E5B0
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 11_2_07480040
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 11_2_07480006
                  Source: payment copy.exe, 00000000.00000000.243677634.000000000104E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameoghF.exeB vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrecision.dll6 vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameInspector.dllN vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1b1d9ce2-62fd-41b4-99a9-182e452ccf71.exe4 vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.267575287.0000000007D40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs payment copy.exe
                  Source: payment copy.exe, 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1b1d9ce2-62fd-41b4-99a9-182e452ccf71.exe4 vs payment copy.exe
                  Source: payment copy.exe, 00000001.00000002.508740371.00000000012F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs payment copy.exe
                  Source: payment copy.exe, 00000001.00000000.259132151.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename1b1d9ce2-62fd-41b4-99a9-182e452ccf71.exe4 vs payment copy.exe
                  Source: payment copy.exeBinary or memory string: OriginalFilenameoghF.exeB vs payment copy.exe
                  Source: payment copy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: WdFVsOe.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: payment copy.exeReversingLabs: Detection: 30%
                  Source: C:\Users\user\Desktop\payment copy.exeFile read: C:\Users\user\Desktop\payment copy.exeJump to behavior
                  Source: payment copy.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\payment copy.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\payment copy.exe C:\Users\user\Desktop\payment copy.exe
                  Source: C:\Users\user\Desktop\payment copy.exeProcess created: C:\Users\user\Desktop\payment copy.exe C:\Users\user\Desktop\payment copy.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: C:\Users\user\Desktop\payment copy.exeProcess created: C:\Users\user\Desktop\payment copy.exe C:\Users\user\Desktop\payment copy.exe
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: C:\Users\user\Desktop\payment copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\payment copy.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\payment copy.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7046.tmpJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/4@3/1
                  Source: payment copy.exe, 00000000.00000000.243511449.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into User_Transportation(UserID,TransportationID) values (@UserID,@TransID);
                  Source: payment copy.exe, 00000000.00000000.243511449.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into TourPlace(Name,Location,TicketPrice) values (@name,@location,@ticket);
                  Source: payment copy.exe, 00000000.00000000.243511449.0000000000F62000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into User_TourPlace(UserID,TourPlaceID) values (@UserID,@TourplaceID);
                  Source: payment copy.exe, 00000001.00000002.532660218.00000000035D2000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.532455798.0000000003575000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531618020.00000000036A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: payment copy.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\payment copy.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\payment copy.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: payment copy.exeString found in binary or memory: AddUserButton'AddUserPhoneTextbox'AdduserEmailtextbox-Adduserpasswordtextbox
                  Source: payment copy.exeString found in binary or memory: Username:-AddusertextBoxUsernameCash
                  Source: 1.0.payment copy.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 1.0.payment copy.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: C:\Users\user\Desktop\payment copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\payment copy.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                  Source: C:\Users\user\Desktop\payment copy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: payment copy.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: payment copy.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 0_2_018AF972 pushad ; iretd
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BCEEA3 push edi; retf
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_05BCEAF4 push es; iretd
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068418F7 push es; retf
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068419C7 push es; retf
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068419CF push es; retf
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068419CB push es; retf
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068419D7 push es; retf
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_068419D3 push es; retf
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_0684197B push es; retf
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.672485147748669
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.672485147748669
                  Source: C:\Users\user\Desktop\payment copy.exeFile created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to dropped file
                  Source: C:\Users\user\Desktop\payment copy.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOeJump to behavior
                  Source: C:\Users\user\Desktop\payment copy.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOeJump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Users\user\Desktop\payment copy.exeFile opened: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe:Zone.Identifier read attributes | delete
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 0.2.payment copy.exe.34005e8.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.WdFVsOe.exe.2f9063c.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.WdFVsOe.exe.2f72e6c.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.33e2e18.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.310942786.000000000325E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.262257256.00000000036CE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.307766391.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 6064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 5864, type: MEMORYSTR
                  Source: payment copy.exe, 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000002.262257256.00000000036CE000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000B.00000002.310942786.000000000325E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000B.00000002.307766391.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000D.00000002.337625854.0000000002DC8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: payment copy.exe, 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000002.262257256.00000000036CE000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000B.00000002.310942786.000000000325E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000B.00000002.307766391.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000D.00000002.337625854.0000000002DC8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 6052Thread sleep time: -38122s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 6048Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -15679732462653109s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -100000s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 5208Thread sleep count: 9815 > 30
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99850s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99734s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99612s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99499s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99390s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99281s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99172s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -99047s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98934s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98825s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98694s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98574s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98452s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98328s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98150s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -98046s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97937s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97827s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97715s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97608s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97499s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97390s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exe TID: 2584Thread sleep time: -97276s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 2064Thread sleep time: -38122s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 2400Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -19369081277395017s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -100000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 2384Thread sleep count: 9733 > 30
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99856s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99704s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99563s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99407s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99250s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99141s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -99032s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98915s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98797s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98657s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98527s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98407s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98282s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98172s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -98016s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97905s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97796s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97687s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97578s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97465s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97344s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 6100Thread sleep time: -97232s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 3408Thread sleep time: -38122s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1328Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -15679732462653109s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -100000s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5164Thread sleep count: 9634 > 30
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99869s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99749s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99640s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99529s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99421s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99297s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99156s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -99047s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98929s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98797s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98687s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98578s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98468s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98359s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98250s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98140s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -98031s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -97906s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -97780s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -97671s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -97546s >= -30000s
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1012Thread sleep time: -97437s >= -30000s
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\payment copy.exeWindow / User API: threadDelayed 9815
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWindow / User API: threadDelayed 9733
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWindow / User API: threadDelayed 9634
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\payment copy.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\payment copy.exeProcess information queried: ProcessInformation
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 38122
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 100000
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99850
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99734
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99612
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99499
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99390
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99281
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99172
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 99047
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98934
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98825
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98694
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98574
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98452
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98328
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98150
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 98046
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97937
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97827
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97715
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97608
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97499
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97390
                  Source: C:\Users\user\Desktop\payment copy.exeThread delayed: delay time: 97276
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 38122
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 100000
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99856
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99704
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99563
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99407
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99250
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99141
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99032
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98915
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98797
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98657
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98527
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98407
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98282
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98172
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98016
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97905
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97796
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97687
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97578
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97465
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97344
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97232
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 38122
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 100000
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99869
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99749
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99640
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99529
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99421
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99297
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99156
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99047
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98929
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98797
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98687
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98578
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98468
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98359
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98250
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98140
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98031
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97906
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97780
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97671
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97546
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97437
                  Source: WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: WdFVsOe.exe, 0000000D.00000002.338181661.0000000003095000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\payment copy.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\payment copy.exeCode function: 1_2_06847F88 LdrInitializeThunk,
                  Source: C:\Users\user\Desktop\payment copy.exeMemory allocated: page read and write | page guard
                  Source: C:\Users\user\Desktop\payment copy.exeProcess created: C:\Users\user\Desktop\payment copy.exe C:\Users\user\Desktop\payment copy.exe
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Users\user\Desktop\payment copy.exe VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Users\user\Desktop\payment copy.exe VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\payment copy.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 6064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 5304, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 2728, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\payment copy.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\Desktop\payment copy.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\Desktop\payment copy.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: C:\Users\user\Desktop\payment copy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                  Source: C:\Users\user\Desktop\payment copy.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                  Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: Yara matchFile source: 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 5304, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 2728, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.payment copy.exe.474a140.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.0.payment copy.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.474a140.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.46b2520.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.payment copy.exe.462b3f8.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 6064, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: payment copy.exe PID: 1848, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 5304, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 2728, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts211
                  Windows Management Instrumentation
                  1
                  Registry Run Keys / Startup Folder
                  11
                  Process Injection
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  114
                  System Information Discovery
                  Remote Services11
                  Archive Collected Data
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default Accounts2
                  Command and Scripting Interpreter
                  Boot or Logon Initialization Scripts1
                  Registry Run Keys / Startup Folder
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Credentials in Registry
                  311
                  Security Software Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  Exfiltration Over Bluetooth1
                  Non-Standard Port
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                  Obfuscated Files or Information
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  Automated Exfiltration1
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
                  Software Packing
                  NTDS131
                  Virtualization/Sandbox Evasion
                  Distributed Component Object ModelInput CaptureScheduled Transfer11
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Masquerading
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common131
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials1
                  Remote System Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                  Process Injection
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                  Hidden Files and Directories
                  Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 756033 Sample: payment copy.exe Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 33 Malicious sample detected (through community Yara rule) 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 Yara detected AgentTesla 2->37 39 7 other signatures 2->39 6 WdFVsOe.exe 3 2->6         started        9 payment copy.exe 3 2->9         started        12 WdFVsOe.exe 2 2->12         started        process3 file4 41 Multi AV Scanner detection for dropped file 6->41 43 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->43 45 Machine Learning detection for dropped file 6->45 47 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->47 14 WdFVsOe.exe 3 6->14         started        29 C:\Users\user\...\payment copy.exe.log, ASCII 9->29 dropped 18 payment copy.exe 2 6 9->18         started        21 WdFVsOe.exe 3 12->21         started        23 WdFVsOe.exe 12->23         started        signatures5 process6 dnsIp7 31 host39.registrar-servers.com 68.65.122.214, 49699, 49700, 49701 NAMECHEAP-NETUS United States 18->31 25 C:\Users\user\AppData\Roaming\...\WdFVsOe.exe, PE32 18->25 dropped 27 C:\Users\user\...\WdFVsOe.exe:Zone.Identifier, ASCII 18->27 dropped 49 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->49 51 Tries to steal Mail credentials (via file / registry access) 18->51 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->53 55 Tries to harvest and steal ftp login credentials 21->55 57 Tries to harvest and steal browser information (history, passwords, etc) 21->57 file8 signatures9

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  payment copy.exe30%ReversingLabsWin32.Trojan.Woreflint
                  payment copy.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe30%ReversingLabsWin32.Trojan.Woreflint
                  SourceDetectionScannerLabelLinkDownload
                  1.0.payment copy.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://crl.microsoft0%URL Reputationsafe
                  http://crl.microsoft0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.com0%URL Reputationsafe
                  http://www.carterandcone.comypo0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.founder.com.cn/cnht0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.founder.com.cn/cnn0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.typography.net0%URL Reputationsafe
                  http://www.fontbureau.comB.TTF0%URL Reputationsafe
                  http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://www.ascendercorp.com/typedesigners.html0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.monotype.95n0%Avira URL Cloudsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.carterandcone.comig0%URL Reputationsafe
                  http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                  http://www.fontbureau.co0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.founder.com.cn/cn/0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.fontbureau.como0%URL Reputationsafe
                  http://crl.micros0%URL Reputationsafe
                  https://wINwvqrEjRpr.net80%Avira URL Cloudsafe
                  http://www.zhongyicts.com.cn00%Avira URL Cloudsafe
                  http://ocsp.sectigo.com090%Avira URL Cloudsafe
                  http://vpDUpe.com0%Avira URL Cloudsafe
                  http://www.founder.com.cn/cndf0%Avira URL Cloudsafe
                  https://wINwvqrEjRpr.net0%Avira URL Cloudsafe
                  http://www.fontbureau.comldwatR80%Avira URL Cloudsafe
                  http://www.zhongyicts.com.cno.m0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  host39.registrar-servers.com
                  68.65.122.214
                  truefalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://127.0.0.1:HTTP/1.1payment copy.exe, 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.fontbureau.com/designersGpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bThepayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers8&payment copy.exe, 00000000.00000003.251240828.00000000062E8000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250252956.00000000062E8000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://crl.microsoftWdFVsOe.exe, 0000000F.00000003.392037383.0000000006E4C000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers?payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://vpDUpe.comWdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.monotype.95npayment copy.exe, 00000000.00000003.250243768.00000000062DD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250205326.00000000062DC000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://www.tiro.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.zhongyicts.com.cn0payment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designerspayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.krpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.compayment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comypopayment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnhtpayment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247497084.00000000062FD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netDpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/cThepayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnnpayment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247497084.00000000062FD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netpayment copy.exe, 00000000.00000003.246833567.00000000062E0000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comB.TTFpayment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://DynDns.comDynDNSnamejidpasswordPsi/PsiWdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://wINwvqrEjRpr.net8WdFVsOe.exe, 0000000C.00000002.532509205.000000000357A000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/DPleasepayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.ascendercorp.com/typedesigners.htmlpayment copy.exe, 00000000.00000003.249126135.00000000062E8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fonts.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sandoll.co.krpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleasepayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comigpayment copy.exe, 00000000.00000003.248035060.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247967738.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.248057940.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.apache.org/licenses/LICENSE-2.0payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.compayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designersdF-payment copy.exe, 00000000.00000003.250252956.00000000062E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://sectigo.com/CPS0payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://ocsp.sectigo.com09payment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.fontbureau.com/designers~payment copy.exe, 00000000.00000003.251240828.00000000062E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://host39.registrar-servers.compayment copy.exe, 00000001.00000002.533327699.000000000360E000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.533250375.00000000035B8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwpayment copy.exe, 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.copayment copy.exe, 00000000.00000003.250990543.000000000631E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cndfpayment copy.exe, 00000000.00000003.247520874.00000000062FD000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.carterandcone.comlpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cn/payment copy.exe, 00000000.00000003.247675536.0000000006300000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247640305.00000000062FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cnpayment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.247640305.00000000062FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://wINwvqrEjRpr.netWdFVsOe.exe, 0000000F.00000002.531668173.00000000036A7000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.com/designers/frere-jones.htmlpayment copy.exe, 00000000.00000003.250921715.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250791703.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250690710.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250751911.000000000631E000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmp, payment copy.exe, 00000000.00000003.250850742.000000000631E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.jiyu-kobo.co.jp/payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.comopayment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.fontbureau.com/designers8payment copy.exe, 00000000.00000002.266294010.00000000074E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.zhongyicts.com.cno.mpayment copy.exe, 00000000.00000003.247858293.0000000006300000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.comldwatR8payment copy.exe, 00000000.00000003.260213566.00000000062D0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://crl.microspayment copy.exe, 00000001.00000002.541820691.000000000674E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                68.65.122.214
                                                host39.registrar-servers.comUnited States
                                                22612NAMECHEAP-NETUSfalse
                                                Joe Sandbox Version:36.0.0 Rainbow Opal
                                                Analysis ID:756033
                                                Start date and time:2022-11-29 14:54:07 +01:00
                                                Joe Sandbox Product:CloudBasic
                                                Overall analysis duration:0h 8m 36s
                                                Hypervisor based Inspection enabled:false
                                                Report type:light
                                                Sample file name:payment copy.exe
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                Number of analysed new started processes analysed:18
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • HDC enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@11/4@3/1
                                                EGA Information:
                                                • Successful, ratio: 100%
                                                HDC Information:Failed
                                                HCA Information:
                                                • Successful, ratio: 95%
                                                • Number of executed functions: 0
                                                • Number of non-executed functions: 0
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                • TCP Packets have been reduced to 100
                                                • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                                • Not all processes where analyzed, report is missing behavior information
                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                TimeTypeDescription
                                                14:55:04API Interceptor663x Sleep call for process: payment copy.exe modified
                                                14:55:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                14:55:22AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                14:55:25API Interceptor855x Sleep call for process: WdFVsOe.exe modified
                                                No context
                                                No context
                                                No context
                                                No context
                                                No context
                                                Process:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1216
                                                Entropy (8bit):5.355304211458859
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                Process:C:\Users\user\Desktop\payment copy.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1216
                                                Entropy (8bit):5.355304211458859
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                Process:C:\Users\user\Desktop\payment copy.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):963072
                                                Entropy (8bit):7.666020966282773
                                                Encrypted:false
                                                SSDEEP:12288:yEhqU+PoxVZ861s4cEOSJJi0yIxYeQo//tdYV71JSYVBgrVDdzoa1cfN:LuoxL1MEPzyIBPY/JSMBgBDdEPf
                                                MD5:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                SHA1:5A7304F89CE6525E0449FFDF0022F5114D181680
                                                SHA-256:EEABB0A04EA59624D05185AFBBF4A1C8E5DB554C0C325871C4C0AC5DE34C5547
                                                SHA-512:7CE8744C23B517043B25F173733888385BE9FDAA67B597C3EC522D24D422ED1FEE9A44CFA51C7C6C3812FBC2FD791FE57A822E3C0A462670448FB0EE507C54EC
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 30%
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....c..............0.............z.... ........@.. ....................... ............@.................................(...O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B................\.......H.......<...........l...8u...S..........................................^..}.....(.......(.....*.0...........s......o......(.....*...0...........s......o......(.....*...0...........s......o......(.....*...0...........s......o......(.....*...0..+.........,..{.......+....,...{....o........(.....*..0..r.............(....s......s....}.....s....}.....s....}.....s....}.....(......{....(....o......{.....o......{.....o .....{....r...p"..@A...s!...o".....{....(#...o$.....{.... .... ..
                                                Process:C:\Users\user\Desktop\payment copy.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.666020966282773
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:payment copy.exe
                                                File size:963072
                                                MD5:52fcd3f3cb7f0eaacc6cc393ba9313da
                                                SHA1:5a7304f89ce6525e0449ffdf0022f5114d181680
                                                SHA256:eeabb0a04ea59624d05185afbbf4a1c8e5db554c0c325871c4c0ac5de34c5547
                                                SHA512:7ce8744c23b517043b25f173733888385be9fdaa67b597c3ec522d24d422ed1fee9a44cfa51c7c6c3812fbc2fd791fe57a822e3c0a462670448fb0ee507c54ec
                                                SSDEEP:12288:yEhqU+PoxVZ861s4cEOSJJi0yIxYeQo//tdYV71JSYVBgrVDdzoa1cfN:LuoxL1MEPzyIBPY/JSMBgBDdEPf
                                                TLSH:3F25E08033A6BF71F5696BF37521800827763C6EA5E0D6285DCDB0DE2A76B5049F0B27
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c..............0.............z.... ........@.. ....................... ............@................................
                                                Icon Hash:00828e8e8686b000
                                                Entrypoint:0x4ec97a
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x6385B1CA [Tue Nov 29 07:16:26 2022 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xec9280x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xee0000x388.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xf00000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xea9800xeaa00False0.8303174530500799data7.672485147748669IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0xee0000x3880x400False0.37109375data2.8467797153196712IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xf00000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountry
                                                RT_VERSION0xee0580x32cdata
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 29, 2022 14:55:25.424974918 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:25.592058897 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:25.592273951 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:25.895911932 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:25.905392885 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:26.075438023 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:26.075676918 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:26.248148918 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:26.295599937 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:26.479507923 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:26.479547024 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:26.479569912 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:26.479587078 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:26.479638100 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:26.479693890 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:26.481981993 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:26.535485983 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:26.703422070 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:26.763364077 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:26.930888891 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:26.933207035 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:27.102840900 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:27.103601933 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:27.310229063 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:27.324902058 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:27.326145887 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:27.492806911 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:27.492857933 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:27.493326902 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:27.666775942 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:27.667530060 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:27.835021019 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:27.837627888 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:27.837723017 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:27.838565111 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:27.838650942 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:28.008394957 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:28.008449078 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:28.008755922 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:28.014305115 CET5874969968.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:28.155173063 CET49699587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:56.683109999 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:56.851603031 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:56.852837086 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:57.171015978 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:57.173106909 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:57.341361046 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:57.341626883 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:57.512027979 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:57.544939995 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:57.730178118 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:57.730206966 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:57.730222940 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:57.730238914 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:57.730304956 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:57.732626915 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:57.747056007 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:57.915951967 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:57.997579098 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:58.166379929 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:58.166922092 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:58.335804939 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:58.336447954 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:58.521548033 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:58.522005081 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:58.691117048 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:58.691618919 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:58.867047071 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:58.867399931 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:59.037381887 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:59.038328886 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:59.038417101 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:59.038485050 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:59.038551092 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:55:59.217993021 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:59.218055964 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:59.227782011 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:59.227830887 CET5874970068.65.122.214192.168.2.3
                                                Nov 29, 2022 14:55:59.273787022 CET49700587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:56:06.216950893 CET49701587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:56:06.384685993 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:06.384807110 CET49701587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:56:06.619520903 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:06.620049000 CET49701587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:56:06.790031910 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:06.793853045 CET49701587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:56:06.964744091 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:06.980041027 CET49701587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:56:07.162103891 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:07.162137032 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:07.162158966 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:07.162178993 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:07.162257910 CET49701587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:56:07.165424109 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:07.167860031 CET49701587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:56:07.336713076 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:07.392863035 CET49701587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:56:07.420589924 CET49701587192.168.2.368.65.122.214
                                                Nov 29, 2022 14:56:07.599742889 CET5874970168.65.122.214192.168.2.3
                                                Nov 29, 2022 14:56:07.603785038 CET49701587192.168.2.368.65.122.214
                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 29, 2022 14:55:25.373497963 CET4997753192.168.2.38.8.8.8
                                                Nov 29, 2022 14:55:25.394471884 CET53499778.8.8.8192.168.2.3
                                                Nov 29, 2022 14:55:56.601288080 CET5784053192.168.2.38.8.8.8
                                                Nov 29, 2022 14:55:56.621599913 CET53578408.8.8.8192.168.2.3
                                                Nov 29, 2022 14:56:06.164307117 CET5799053192.168.2.38.8.8.8
                                                Nov 29, 2022 14:56:06.181865931 CET53579908.8.8.8192.168.2.3
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Nov 29, 2022 14:55:25.373497963 CET192.168.2.38.8.8.80x8bf7Standard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                                Nov 29, 2022 14:55:56.601288080 CET192.168.2.38.8.8.80x1adeStandard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                                Nov 29, 2022 14:56:06.164307117 CET192.168.2.38.8.8.80xea32Standard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Nov 29, 2022 14:55:25.394471884 CET8.8.8.8192.168.2.30x8bf7No error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                                Nov 29, 2022 14:55:56.621599913 CET8.8.8.8192.168.2.30x1adeNo error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                                Nov 29, 2022 14:56:06.181865931 CET8.8.8.8192.168.2.30xea32No error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Nov 29, 2022 14:55:25.895911932 CET5874969968.65.122.214192.168.2.3220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 08:55:25 -0500
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Nov 29, 2022 14:55:25.905392885 CET49699587192.168.2.368.65.122.214EHLO 332260
                                                Nov 29, 2022 14:55:26.075438023 CET5874969968.65.122.214192.168.2.3250-host39.registrar-servers.com Hello 332260 [102.129.143.49]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPE_CONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Nov 29, 2022 14:55:26.075676918 CET49699587192.168.2.368.65.122.214STARTTLS
                                                Nov 29, 2022 14:55:26.248148918 CET5874969968.65.122.214192.168.2.3220 TLS go ahead
                                                Nov 29, 2022 14:55:57.171015978 CET5874970068.65.122.214192.168.2.3220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 08:55:57 -0500
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Nov 29, 2022 14:55:57.173106909 CET49700587192.168.2.368.65.122.214EHLO 332260
                                                Nov 29, 2022 14:55:57.341361046 CET5874970068.65.122.214192.168.2.3250-host39.registrar-servers.com Hello 332260 [102.129.143.49]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPE_CONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Nov 29, 2022 14:55:57.341626883 CET49700587192.168.2.368.65.122.214STARTTLS
                                                Nov 29, 2022 14:55:57.512027979 CET5874970068.65.122.214192.168.2.3220 TLS go ahead
                                                Nov 29, 2022 14:56:06.619520903 CET5874970168.65.122.214192.168.2.3220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 08:56:06 -0500
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Nov 29, 2022 14:56:06.620049000 CET49701587192.168.2.368.65.122.214EHLO 332260
                                                Nov 29, 2022 14:56:06.790031910 CET5874970168.65.122.214192.168.2.3250-host39.registrar-servers.com Hello 332260 [102.129.143.49]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPE_CONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Nov 29, 2022 14:56:06.793853045 CET49701587192.168.2.368.65.122.214STARTTLS
                                                Nov 29, 2022 14:56:06.964744091 CET5874970168.65.122.214192.168.2.3220 TLS go ahead

                                                Click to jump to process

                                                Target ID:0
                                                Start time:14:54:58
                                                Start date:29/11/2022
                                                Path:C:\Users\user\Desktop\payment copy.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\payment copy.exe
                                                Imagebase:0xf60000
                                                File size:963072 bytes
                                                MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.261250021.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.262257256.00000000036CE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.263520436.000000000462B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                Reputation:low

                                                Target ID:1
                                                Start time:14:55:05
                                                Start date:29/11/2022
                                                Path:C:\Users\user\Desktop\payment copy.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\Desktop\payment copy.exe
                                                Imagebase:0xda0000
                                                File size:963072 bytes
                                                MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000001.00000000.258978020.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.522170606.0000000003291000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low

                                                Target ID:11
                                                Start time:14:55:22
                                                Start date:29/11/2022
                                                Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                                                Imagebase:0xaf0000
                                                File size:963072 bytes
                                                MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000B.00000002.310942786.000000000325E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000B.00000002.307766391.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Antivirus matches:
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 30%, ReversingLabs
                                                Reputation:low

                                                Target ID:12
                                                Start time:14:55:27
                                                Start date:29/11/2022
                                                Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                Imagebase:0xcd0000
                                                File size:963072 bytes
                                                MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.521910892.000000000323C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low

                                                Target ID:13
                                                Start time:14:55:30
                                                Start date:29/11/2022
                                                Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                                                Imagebase:0x7c0000
                                                File size:963072 bytes
                                                MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:.Net C# or VB.NET
                                                Reputation:low

                                                Target ID:14
                                                Start time:14:55:39
                                                Start date:29/11/2022
                                                Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                Imagebase:0x380000
                                                File size:963072 bytes
                                                MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:low

                                                Target ID:15
                                                Start time:14:55:40
                                                Start date:29/11/2022
                                                Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                Imagebase:0xdc0000
                                                File size:963072 bytes
                                                MD5 hash:52FCD3F3CB7F0EAACC6CC393BA9313DA
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000002.520858621.0000000003361000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low

                                                No disassembly